메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Modelling trust requirements by means of a visualization language

Author keywords

[No Author keywords available]

Indexed keywords

REQUIREMENTS ELICITATIONS; VISUAL LANGUAGES;

EID: 64849111245     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/REV.2008.3     Document Type: Conference Paper
Times cited : (3)

References (27)
  • 3
    • 64849116313 scopus 로고    scopus 로고
    • Michael, J. B., Hestad, D.R., Pedersen, C.M., Gaines L.T (2002). Incorporating the Human Element of Trust into Information Systems.IAnewsletter 5: 4-8.
    • Michael, J. B., Hestad, D.R., Pedersen, C.M., Gaines L.T (2002). "Incorporating the Human Element of Trust into Information Systems."IAnewsletter 5: 4-8.
  • 4
    • 85022739470 scopus 로고
    • Calculativeness, Trust, and Economic Organization
    • Williamson, O. (1993) Calculativeness, Trust, and Economic Organization. Journal of Law and Economics, 34, 453 502.
    • (1993) Journal of Law and Economics , vol.34 , pp. 453-502
    • Williamson, O.1
  • 5
    • 64849105157 scopus 로고    scopus 로고
    • Almenarez, F., Marin, A., Campo, C., Garc1a C (2004 ). PTM: A Pervasive Trust Management Model for Dynamic Open Environments. . First Workshop on Pervasive Security, Privacy and Trust, PSPT'04 in conjunction with Mobiquitous., Boston, USA.
    • Almenarez, F., Marin, A., Campo, C., Garc1a C (2004 ). PTM: A Pervasive Trust Management Model for Dynamic Open Environments. . First Workshop on Pervasive Security, Privacy and Trust, PSPT'04 in conjunction with Mobiquitous., Boston, USA.
  • 6
    • 64849088554 scopus 로고    scopus 로고
    • Building Trust in Partnerships Between Community Orgnization and Government
    • Melbourne
    • Alford, J. (2004). Building Trust in Partnerships Between Community Orgnization and Government.. Changing the Way Government Works Seminar, Melbourne.
    • (2004) Changing the Way Government Works Seminar
    • Alford, J.1
  • 7
    • 64849092874 scopus 로고    scopus 로고
    • A Hybrid Trust Management Model For MAS Based
    • Faculty of Computer Science and Information System University of Technology Malaysia, Skudai, Johor
    • Maarof, M. A., Krishna, K (2002). "A Hybrid Trust Management Model For MAS Based. Information Security Group, Faculty of Computer Science and Information System University of Technology Malaysia, 81310 Skudai, Johor."
    • (2002) Information Security Group , pp. 81310
    • Maarof, M.A.1    Krishna, K.2
  • 8
    • 0030351690 scopus 로고    scopus 로고
    • Trust and Breach of the Psychological Contract
    • Robinson, S. L. (1996). "Trust and Breach of the Psychological Contract.. "Administrative Science Quarterly 41: 574-579.
    • (1996) Administrative Science Quarterly , vol.41 , pp. 574-579
    • Robinson, S.L.1
  • 12
    • 64849092340 scopus 로고    scopus 로고
    • Wilson, M, Arenas, A, Schubert, L, Ed, TrustCoM Framework
    • Wilson, M., Arenas, A., Schubert, L, Ed. (2007). TrustCoM Framework V4. AL1 - TrustCoM Framework.
    • (2007) TrustCoM Framework V4
  • 13
    • 64849104591 scopus 로고    scopus 로고
    • Developing Security-Critical Applications with UMLsec. A Short Walk-Through
    • Jürjens, J. (2004). "Developing Security-Critical Applications with UMLsec. A Short Walk-Through." The European Journal for the Informatics Professional 5(2).
    • (2004) The European Journal for the Informatics Professional , vol.5 , Issue.2
    • Jürjens, J.1
  • 14
    • 64849106913 scopus 로고    scopus 로고
    • Basin, D., Clavel, M., Doser, J, Egea, M (2007). A Metamodel-Based Approach for Analyzing Security-Design Models. MODELS 2007, Nashville, TN.
    • Basin, D., Clavel, M., Doser, J, Egea, M (2007). A Metamodel-Based Approach for Analyzing Security-Design Models. MODELS 2007, Nashville, TN.
  • 15
    • 23944475544 scopus 로고    scopus 로고
    • When Security meets Software Engineering: A case of modelling secure information systems, in the Information System
    • Mouratidis, H., Giorgini, P., Manson, G (2005). "When Security meets Software Engineering: A case of modelling secure information systems, in the Information System." Elsevier 30(8): 609-629.
    • (2005) Elsevier , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 16
    • 22144453559 scopus 로고    scopus 로고
    • Model based Security Risk Analysis for Web Applications: The CORAS approach
    • Oxford, UK
    • Dimitrakos, T., Ritchie, B., Raptis, D., Stoølen, K (2002). Model based Security Risk Analysis for Web Applications: The CORAS approach. EuroWeb 2002 Conference, Oxford, UK.
    • (2002) EuroWeb 2002 Conference
    • Dimitrakos, T.1    Ritchie, B.2    Raptis, D.3    Stoølen, K.4
  • 18
    • 26844545857 scopus 로고    scopus 로고
    • Towards an Ontology of Trust
    • Copenhagen, Denmark, Springer Berlin, He6idelberg
    • Viljanen, L. (2005). Towards an Ontology of Trust. Lecture Notes in Computer Science. Copenhagen, Denmark, Springer Berlin / He6idelberg.
    • (2005) Lecture Notes in Computer Science
    • Viljanen, L.1
  • 21
    • 64849112553 scopus 로고    scopus 로고
    • Simmonds, A., Sandilands, P., Ekert, L.V (2004). An Ontology for Network Security Attacks. Lecture Notes in Computer Science, Kathmandu, Nepal, Springer Berlin / Heidelberg
    • Simmonds, A., Sandilands, P., Ekert, L.V (2004). An Ontology for Network Security Attacks. Lecture Notes in Computer Science, Kathmandu, Nepal, Springer Berlin / Heidelberg


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.