메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1429-1436

Modelling security properties in a Grid-based operating system with anti-goals

Author keywords

[No Author keywords available]

Indexed keywords

TECHNOLOGY;

EID: 49049111838     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.159     Document Type: Conference Paper
Times cited : (4)

References (14)
  • 4
    • 33749035450 scopus 로고    scopus 로고
    • Requirements Engineering for Trust Management: Model, Methodology, and Reasoning
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Requirements Engineering for Trust Management: Model, Methodology, and Reasoning. Journal of Information Security, 5(4):257-274, 2006.
    • (2006) Journal of Information Security , vol.5 , Issue.4 , pp. 257-274
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 10
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting Security Requirements with Misuse Cases
    • G. Sindre and A. L. Opdahl. Eliciting Security Requirements with Misuse Cases. Requirements Engineering, 10(1):34-44, 2005.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 14
    • 49049107998 scopus 로고    scopus 로고
    • XtreemOS. XtreemOS Deliverable D3.5.2: Security Requirements for a Grid-based OS, 2007.
    • XtreemOS. XtreemOS Deliverable D3.5.2: Security Requirements for a Grid-based OS, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.