메뉴 건너뛰기




Volumn 4801 LNCS, Issue , 2007, Pages 375-390

A goal oriented approach for modeling and analyzing security trade-offs

Author keywords

Goal model evaluation; Goal modeling; Security trade offs; Trade off analysis

Indexed keywords

COMPUTER SYSTEM FIREWALLS; CRYPTOGRAPHY; MATHEMATICAL MODELS; SOFTWARE DESIGN;

EID: 38349123642     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75563-0_26     Document Type: Conference Paper
Times cited : (73)

References (31)
  • 2
    • 84931838020 scopus 로고    scopus 로고
    • Castro, J., Kolp, M., Mylopoulos, J.: A requirements-driven development methodology, In Proc. of the 13th Int. Conf. on Advanced Information Systems Engineering, CAiSE'Ol. In: Dittrich, K.R., Geppert, A., Norrie, M.C. (eds.) CAiSE 2001. LNCS, 2068, pp. 108-123. Springer, Heidelberg (2001)
    • Castro, J., Kolp, M., Mylopoulos, J.: A requirements-driven development methodology, In Proc. of the 13th Int. Conf. on Advanced Information Systems Engineering, CAiSE'Ol. In: Dittrich, K.R., Geppert, A., Norrie, M.C. (eds.) CAiSE 2001. LNCS, vol. 2068, pp. 108-123. Springer, Heidelberg (2001)
  • 5
    • 84942866002 scopus 로고    scopus 로고
    • Security and Privacy Requirements Analysis within a Social Setting
    • IEEE Computer Society Press, Los Alamitos
    • Liu, L., Yu, E., Mylopoulos, J.: Security and Privacy Requirements Analysis within a Social Setting. In: IEEE Joint Int. Conf. on Requirements Engineering, pp. 151-161. IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) IEEE Joint Int. Conf. on Requirements Engineering , pp. 151-161
    • Liu, L.1    Yu, E.2    Mylopoulos, J.3
  • 6
    • 27644537252 scopus 로고    scopus 로고
    • Modeling Security Requirements through Ownership, Permission and Delegation
    • IEEE Computer Society Press, Los Alamitos
    • Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling Security Requirements through Ownership, Permission and Delegation. In: 13th IEEE Int. Requirements Engineering Conf, pp. 167-176. IEEE Computer Society Press, Los Alamitos (2005)
    • (2005) 13th IEEE Int. Requirements Engineering Conf , pp. 167-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 8
    • 0030781944 scopus 로고    scopus 로고
    • Towards Modelling and Reasoning Support for Early-Phase Requirements Engineering
    • Yu, E.: Towards Modelling and Reasoning Support for Early-Phase Requirements Engineering. In: Proc. of the 3rd IEEE Int. Symp. on Requirements Engineering, pp. 226-235 (1997)
    • (1997) Proc. of the 3rd IEEE Int. Symp. on Requirements Engineering , pp. 226-235
    • Yu, E.1
  • 12
    • 38349068106 scopus 로고    scopus 로고
    • Masters Thesis, University of Toronto, Department of Computer Science
    • Horkoff, J.: Using i* Models for Evaluation, Masters Thesis, University of Toronto, Department of Computer Science (2006)
    • (2006) Using i* Models for Evaluation
    • Horkoff, J.1
  • 14
    • 85045573601 scopus 로고    scopus 로고
    • Using Abuse Case Models for Security Requirements Analysis
    • McDermott, J, Fox, C, eds, IEEE Computer Society Press, Los Alamitos
    • McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: McDermott, J., Fox, C. (eds.) Proc. 15th. IEEE Annual Computer Security Applications Conf., pp. 55-64. IEEE Computer Society Press, Los Alamitos (1999)
    • (1999) Proc. 15th. IEEE Annual Computer Security Applications Conf , pp. 55-64
    • McDermott, J.1    Fox, C.2
  • 16
    • 35048870670 scopus 로고    scopus 로고
    • On Security Requirements Analysis for Multi-Agent Systems
    • Lucena, C, Garcia, A, Romanovsky, A, Castro, J, Alencar, P.S.C, eds, Software Engineering for Multi-Agent Systems II, Springer, Heidelberg
    • Bresciani, P., Giorgini, P., Mouratidis, H.: On Security Requirements Analysis for Multi-Agent Systems. In: Lucena, C., Garcia, A., Romanovsky, A., Castro, J., Alencar, P.S.C. (eds.) Software Engineering for Multi-Agent Systems II. LNCS, vol. 2940, pp. 35-48. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2940 , pp. 35-48
    • Bresciani, P.1    Giorgini, P.2    Mouratidis, H.3
  • 19
    • 38349135028 scopus 로고    scopus 로고
    • Guide to Selecting Information Technology Security Products, Recommendations of the National Institute of Standards and Technology
    • Granee, T., Stevens, M., Myers, M.: Guide to Selecting Information Technology Security Products, Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-836 (2003)
    • (2003) NIST Special Publication , vol.800-836
    • Granee, T.1    Stevens, M.2    Myers, M.3
  • 23
    • 38349152964 scopus 로고    scopus 로고
    • Core Security Requirements Artefacts, Department of Computing, The Open University, Milton Keynes UK
    • Technical Report 2004/23
    • Moffett, J.D., Haley, C.B., Nuseibeh, B.: Core Security Requirements Artefacts, Department of Computing, The Open University, Milton Keynes UK, Technical Report 2004/23 (2004)
    • (2004)
    • Moffett, J.D.1    Haley, C.B.2    Nuseibeh, B.3
  • 25
    • 0037252218 scopus 로고    scopus 로고
    • Good-Enough Security: Toward a Pragmatic Business-Driven Discipline, IEEE Internet Computing
    • Internet Computing
    • Sandhu, R.: Good-Enough Security: Toward a Pragmatic Business-Driven Discipline," IEEE Internet Computing, Vol. IEEE Internet Computing 07(1), 66-68 (2003)
    • (2003) IEEE Internet Computing , vol.7 , Issue.1 , pp. 66-68
    • Sandhu, R.1
  • 26
    • 38349089223 scopus 로고    scopus 로고
    • US-CERT Vulnerability Notes Database, United States Computer Emergency Readiness Team, http://www.kb.cert.org/vuls
    • US-CERT Vulnerability Notes Database, United States Computer Emergency Readiness Team, http://www.kb.cert.org/vuls
  • 28
    • 38349158862 scopus 로고    scopus 로고
    • Elahi, G., Yu, E.: A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs, Technical Report, University of Toronto, Department of Computer Science, Available (2007), at http://istar.rwth-aachen.de/tike-index. php?page=Security+Requirements+Engineering
    • Elahi, G., Yu, E.: A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs, Technical Report, University of Toronto, Department of Computer Science, Available (2007), at http://istar.rwth-aachen.de/tike-index. php?page=Security+Requirements+Engineering
  • 31
    • 29844451321 scopus 로고    scopus 로고
    • Susi, A., Perini, A., Mylopoulos, J.: The Tropos Metamodel and its Use. Informatica 29, 401-408 (2005)
    • Susi, A., Perini, A., Mylopoulos, J.: The Tropos Metamodel and its Use. Informatica 29, 401-408 (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.