메뉴 건너뛰기




Volumn , Issue , 2006, Pages 315-318

Detecting conflicts of interest

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SYSTEMS; REQUIREMENTS ENGINEERING; SOCIETIES AND INSTITUTIONS;

EID: 41149138298     PISSN: 1090705X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RE.2006.16     Document Type: Conference Paper
Times cited : (8)

References (13)
  • 1
    • 84856202162 scopus 로고    scopus 로고
    • Using Event Calculus to Formalise Policy Specification and Analysis
    • IEEE Press
    • A. K. Bandara, E. Lupu, and A. Russo. Using Event Calculus to Formalise Policy Specification and Analysis. In Proc. of POLICY'03, pages 26-39. IEEE Press, 2003.
    • (2003) Proc. of POLICY'03 , pp. 26-39
    • Bandara, A.K.1    Lupu, E.2    Russo, A.3
  • 2
    • 33745471209 scopus 로고    scopus 로고
    • Model Driven Security: From UML Models to Access Control Infrastructures
    • D. Basin, J. Doser, and T. Lodderstedt. Model Driven Security: from UML Models to Access Control Infrastructures. TOSEM, 15(1):39-91, 2006.
    • (2006) TOSEM , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 3
    • 27644537252 scopus 로고    scopus 로고
    • Modeling Security Requirements Through Ownership, Permission and Delegation
    • IEEE Press
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of RE'05, pages 167-176. IEEE Press, 2005.
    • (2005) Proc. of RE'05 , pp. 167-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 4
    • 0033333334 scopus 로고    scopus 로고
    • Conflicts in Policy-Based Distributed Systems Management
    • E. C. Lupu and M. Sloman. Conflicts in Policy-Based Distributed Systems Management. TSE, 25(6):852-869, 1999.
    • (1999) TSE , vol.25 , Issue.6 , pp. 852-869
    • Lupu, E.C.1    Sloman, M.2
  • 5
    • 33746078483 scopus 로고    scopus 로고
    • Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank
    • Technical Report DIT-06-002, University of Trento
    • F. Massacci and N. Zannone. Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. Technical Report DIT-06-002, University of Trento, 2006.
    • (2006)
    • Massacci, F.1    Zannone, N.2
  • 6
    • 0012794098 scopus 로고
    • Policy Conflict Analysis in Distributed System Management
    • J. D. Moffett and M. S. Sloman. Policy Conflict Analysis in Distributed System Management. J. of Organisational Comp., 4(1):1-22, 1994.
    • (1994) J. of Organisational Comp , vol.4 , Issue.1 , pp. 1-22
    • Moffett, J.D.1    Sloman, M.S.2
  • 7
    • 0001940210 scopus 로고    scopus 로고
    • The role graph model and conflict of interest
    • M. Nyanchama and S. Osborn. The role graph model and conflict of interest. TISSEC, 2(1):3-33, 1999.
    • (1999) TISSEC , vol.2 , Issue.1 , pp. 3-33
    • Nyanchama, M.1    Osborn, S.2
  • 8
    • 41149102153 scopus 로고    scopus 로고
    • Promontory Financial Group, Wachtell, Lipton, Rosen, and Katz. Report to the Board and Directors of Allied Irish Bank P.L.C., Allfirst Financial Inc., and Allfirst Bank Concerning Currency Trading Losses, March 12, 2003.
    • Promontory Financial Group, Wachtell, Lipton, Rosen, and Katz. Report to the Board and Directors of Allied Irish Bank P.L.C., Allfirst Financial Inc., and Allfirst Bank Concerning Currency Trading Losses, March 12, 2003.
  • 9
    • 4143147399 scopus 로고    scopus 로고
    • Using UML to visualize role-based access control constraints
    • ACM Press
    • I. Ray, N. Li, R. France, and D.-K. Kim. Using UML to visualize role-based access control constraints. In Proc. of SACMAT'04, pages 115-124. ACM Press, 2004.
    • (2004) Proc. of SACMAT'04 , pp. 115-124
    • Ray, I.1    Li, N.2    France, R.3    Kim, D.-K.4
  • 10
    • 84949684807 scopus 로고    scopus 로고
    • UML-Based Representation of Role-Based Access Control
    • IEEE Press
    • M. E. Shin and G.-J. Ahn. UML-Based Representation of Role-Based Access Control. In Proc. of WETICE'00, pages 195-200. IEEE Press, 2000.
    • (2000) Proc. of WETICE'00 , pp. 195-200
    • Shin, M.E.1    Ahn, G.-J.2
  • 11
    • 79957904799 scopus 로고    scopus 로고
    • R. Simon and M. E. Zurko. Separation of duty in role-based environments. In Proc. of CSFW'97, pages 183-194. 1997.
    • R. Simon and M. E. Zurko. Separation of duty in role-based environments. In Proc. of CSFW'97, pages 183-194. 1997.
  • 13
    • 0032203918 scopus 로고    scopus 로고
    • Managing Conflicts in Goal-Driven Requirements Engineering
    • A. van Lamsweerde, R. Darimont, and E. Letier. Managing Conflicts in Goal-Driven Requirements Engineering. TSE, 24(11):908-926, 1998.
    • (1998) TSE , vol.24 , Issue.11 , pp. 908-926
    • van Lamsweerde, A.1    Darimont, R.2    Letier, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.