메뉴 건너뛰기




Volumn , Issue , 2008, Pages 9-13

Enforcing a security pattern in stakeholder goal models

Author keywords

Goal models; Model transformations; RBAC; Security patterns

Indexed keywords

EARLY DETECTION; GOAL MODELS; GOAL ORIENTED MODELING; GOAL-ORIENTED; MODEL TRANSFORMATIONS; MODEL-DRIVEN; RBAC; REQUIREMENTS MODELS; ROLE-BASED ACCESS CONTROL; SECURITY PATTERNS; SECURITY PROBLEMS;

EID: 70349240293     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456362.1456366     Document Type: Conference Paper
Times cited : (16)

References (29)
  • 5
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • Charles Haley, Robin Laney, Jonathan Moffett, and Bashar Nuseibeh. Security requirements engineering: A framework for representation and analysis. IEEE Trans. Softw. Eng. (TSE), 34(1):133-153, 2008.
    • (2008) IEEE Trans. Softw. Eng. (TSE) , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.1    Laney, R.2    Moffett, J.3    Nuseibeh, B.4
  • 6
    • 27644537252 scopus 로고    scopus 로고
    • Modeling Security Requirements Through Ownership, Permission and Delegation
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of RE, volume 5, 2005.
    • (2005) Proc. of RE , vol.5
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 7
    • 17044394776 scopus 로고    scopus 로고
    • The effect of trust assumptions on the elaboration of security requirements
    • CB Haley, RC Laney, JD Moffett, and B. Nuseibeh. The effect of trust assumptions on the elaboration of security requirements. In Proc. of RE, pages 102-111, 2004.
    • (2004) Proc. of RE , pp. 102-111
    • Haley, C.B.1    Laney, R.C.2    Moffett, J.D.3    Nuseibeh, B.4
  • 9
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre and A.L. Opdahl. Eliciting security requirements with misuse cases. Requirements Engineering, 10(1):34-44, 2005.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 10
    • 84942929509 scopus 로고    scopus 로고
    • Introducing abuse frames for analysing security requirements
    • L. Lin, B. Nuseibeh, D. Ince, M. Jackson, and J. Moffett. Introducing abuse frames for analysing security requirements. In Proc. of RE, pages 371-372, 2003.
    • (2003) Proc. of RE , pp. 371-372
    • Lin, L.1    Nuseibeh, B.2    Ince, D.3    Jackson, M.4    Moffett, J.5
  • 11
    • 17744386721 scopus 로고    scopus 로고
    • Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
    • F. Massacci, M. Prest, and N. Zannone. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Computer Standards & Interfaces, 27(5):445-455, 2005.
    • (2005) Computer Standards & Interfaces , vol.27 , Issue.5 , pp. 445-455
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 15
    • 40049083379 scopus 로고    scopus 로고
    • Bas Graaf, Sven Weber, and Arie van Deursen. Model-driven migration of supervisory machine control architectures. J. Syst. Softw., 81(4):517-535, 2008.
    • Bas Graaf, Sven Weber, and Arie van Deursen. Model-driven migration of supervisory machine control architectures. J. Syst. Softw., 81(4):517-535, 2008.
  • 20
    • 38549098015 scopus 로고    scopus 로고
    • Sampaio do Prado Leite, and John Mylopoulos. From goals to aspects: Discovering aspects from goal models
    • Yijun Yu, Julio Cesar Sampaio do Prado Leite, and John Mylopoulos. From goals to aspects: Discovering aspects from goal models. In Proc. of RE, pages 38-47, 2004.
    • (2004) Proc. of RE , pp. 38-47
    • Yu, Y.1    Cesar, J.2
  • 21
    • 33646512996 scopus 로고    scopus 로고
    • Jaap Gordijn, Eric Yu, and Bas van der Raadt. e-service design using i* and e3value modeling. IEEE Software, 2006.
    • Jaap Gordijn, Eric Yu, and Bas van der Raadt. e-service design using i* and e3value modeling. IEEE Software, 2006.
  • 22
    • 33746034514 scopus 로고    scopus 로고
    • An empirical evaluation of the i* framework in a model-based software generation environment
    • Hugo Estrada et al. An empirical evaluation of the i* framework in a model-based software generation environment. In Proc. of CAiSE, pages 513-527, 2006.
    • (2006) Proc. of CAiSE , pp. 513-527
    • Estrada, H.1
  • 24
    • 49049102597 scopus 로고    scopus 로고
    • Towards a comprehensive framework for secure systems development
    • Haralambos Mouratidis, Jan Jurjens, and Jorge Fox. Towards a comprehensive framework for secure systems development. In Proc. of CAiSE, 2006.
    • (2006) Proc. of CAiSE
    • Mouratidis, H.1    Jurjens, J.2    Fox, J.3
  • 25
    • 33746064515 scopus 로고    scopus 로고
    • Security Engineering with Patterns: Origins, Theoretical Model, and New Applications
    • Springer
    • Markus Schumacher. Security Engineering with Patterns: Origins, Theoretical Model, and New Applications. LNCS, Vol.2754, Springer, 2003.
    • (2003) LNCS , vol.2754
    • Schumacher, M.1
  • 27
    • 70349259645 scopus 로고    scopus 로고
    • Linking Patterns and Non-Functional Requirements
    • Ivan Araujo and Michael Weiss. Linking Patterns and Non-Functional Requirements. In Proc. of PLoP, 2002.
    • (2002) Proc. of PLoP
    • Araujo, I.1    Weiss, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.