-
1
-
-
0028532579
-
Why cryptosystems fail
-
R. Anderson, Why cryptosystems fail, CACM 37(11) (1994) 32-40.
-
(1994)
CACM
, vol.37
, Issue.11
, pp. 32-40
-
-
Anderson, R.1
-
2
-
-
45849138846
-
Modelling risk and identifying countermeasures in organizations
-
Y. Asnar and P. Giorgini, Modelling risk and identifying countermeasures in organizations, in Proc. of CRITIS'06, 2006.
-
(2006)
Proc. of CRITIS'06
-
-
Asnar, Y.1
Giorgini, P.2
-
3
-
-
34548171255
-
From trust to dependability through risk analysis
-
Y. Asnar, P. Giorgini, F. Massacci, and N. Zannone, From trust to dependability through risk analysis, in Proc. of ARES'07, 2007.
-
(2007)
Proc. of ARES'07
-
-
Asnar, Y.1
Giorgini, P.2
Massacci, F.3
Zannone, N.4
-
4
-
-
84892300775
-
Ontologies, meta-models, and the modeldriven paradigm
-
(Springer-Verlag)
-
U. Aßmann, S. Zschaler, and G. Wagner, Ontologies, meta-models, and the modeldriven paradigm, in Ontologies for Software Engineering and Software Technology (Springer-Verlag, 2006), pp. 249-273.
-
(2006)
Ontologies for Software Engineering and Software Technology
, pp. 249-273
-
-
Aßmann, U.1
Zschaler, S.2
Wagner, G.3
-
5
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
D. Basin, J. Doser, and T. Lodderstedt, Model driven security: From UML models to access control infrastructures, TOSEM 15(1) (2006) 39-91.
-
(2006)
TOSEM
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
6
-
-
3142750497
-
TROPOS: An agent-oriented software development methodology
-
P. Bresciani, P. Giorgini, F. Giunchiglia, J. Mylopoulos, and A. Perini. TROPOS: An agent-oriented software development methodology, JAAMAS 8(3) (2004) 203-236.
-
(2004)
JAAMAS
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
7
-
-
33746068596
-
Designing security requirements models through planning
-
Proc. of CAiSE'06. (Springer-Verlag)
-
V. Bryl, F. Massacci, J. Mylopoulos, and N. Zannone, Designing security requirements models through planning, in Proc. of CAiSE'06, LNCS 4001 (Springer-Verlag, 2006), pp. 33-47.
-
(2006)
LNCS
, vol.4001
, pp. 33-47
-
-
Bryl, V.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
9
-
-
34548045316
-
How to capture, communicate, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach
-
(ACM Press)
-
L. Compagna, P. E. Khoury, F. Massacci, R. Thomas, and N. Zannone, How to capture, communicate, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach, in Proc. of ICAIL'07 (ACM Press, 2007), pp. 149-154.
-
(2007)
Proc. of ICAIL'07
, pp. 149-154
-
-
Compagna, L.1
Khoury, P.E.2
Massacci, F.3
Thomas, R.4
Zannone, N.5
-
10
-
-
84948972584
-
Security requirements engineering: When anti-requirements hit the fan
-
(IEEE Press)
-
R. Crook, D. Ince, L. Lin, and B. Nuseibeh, Security requirements engineering: When anti-requirements hit the fan, in Proc. of RE'02 (IEEE Press, 2002), pp. 203-205.
-
(2002)
Proc. of RE'02
, pp. 203-205
-
-
Crook, R.1
Ince, D.2
Lin, L.3
Nuseibeh, B.4
-
13
-
-
33745641865
-
Foundations of meta-pyramids: Languages vs. metamodels - Episode II: Story of Thotus the baboon
-
no. 04101, IBFI, Schloss Dagstuhl, Germany
-
J.-M. Favre, Foundations of meta-pyramids: Languages vs. metamodels - episode II: Story of Thotus the baboon, in Language Engineering for Model-Driven Software Development, Dagstuhl Seminar Proceedings, no.04101, IBFI, Schloss Dagstuhl, Germany, 2005.
-
(2005)
Language Engineering for Model-Driven Software Development, Dagstuhl Seminar Proceedings
-
-
Favre, J.-M.1
-
14
-
-
13244278129
-
Applications of tool support for risk-informed requirements reasoning
-
M. S. Feather, S. L. Cornford, K. A. Hicks, and K. R. Johnson, Applications of tool support for risk-informed requirements reasoning, Comput. Syst. Sci. Eng. 20(1) (2005) 5-17.
-
(2005)
Comput. Syst. Sci. Eng.
, vol.20
, Issue.1
, pp. 5-17
-
-
Feather, M.S.1
Cornford, S.L.2
Hicks, K.A.3
Johnson, K.R.4
-
15
-
-
36648999170
-
From early requirements analysis towards secure workflows
-
The full version appears as Technical Report, DIT- 07-036, at
-
G. Frankova, F. Massacci, and M. Seguran, From early requirements analysis towards secure workflows, in Proc. of IFIPTM'07, 2007. The full version appears as Technical Report, DIT-07-036, at http://eprints.biblio.unitn.it/ archive/00001220/.
-
(2007)
Proc. of IFIPTM'07
-
-
Frankova, G.1
Massacci, F.2
Seguran, M.3
-
16
-
-
27644432492
-
Modeling the impact of trust and distrust in agent networks
-
G. Gans, M. Jarke, S. Kethers, and G. Lakemeyer. Modeling the impact of trust and distrust in agent networks, in Proc. of AOIS'01, 2001, pp. 45-58.
-
(2001)
Proc. of AOIS'01
, pp. 45-58
-
-
Gans, G.1
Jarke, M.2
Kethers, S.3
Lakemeyer., G.4
-
17
-
-
24944578244
-
Modelling social and individual trust in requirements engineering methodologies
-
Proc. of iTrust'05. (Springer-Verlag)
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, Modelling social and individual trust in requirements engineering methodologies, in Proc. of iTrust'05, LNCS 3477 (Springer-Verlag, 2005), pp. 161-176.
-
(2005)
LNCS
, vol.3477
, pp. 161-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
18
-
-
41149138298
-
Detecting conflicts of interest
-
(IEEE Press)
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, Detecting conflicts of interest, in Proc. of RE'06 (IEEE Press, 2006), pp. 315-318.
-
(2006)
Proc. of RE'06
, pp. 315-318
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
19
-
-
84924413055
-
Security and trust requirements engineering
-
FOSAD 2004/ 2005. (Springer-Verlag)
-
P. Giorgini, F. Massacci, and N. Zannone, Security and trust requirements engineering, in FOSAD 2004/2005, LNCS 3655 (Springer-Verlag, 2005), pp. 237-272.
-
(2005)
LNCS
, vol.3655
, pp. 237-272
-
-
Giorgini, P.1
Massacci, F.2
Zannone, N.3
-
20
-
-
13844255590
-
Goal-oriented requirements analysis and reasoning in the Tropos methodology
-
P. Giorgini, J. Mylopoulos, and R. Sebastiani, Goal-oriented requirements analysis and reasoning in the Tropos methodology, Eng. Applications of Artif. Intell. 18(2) (2005) 159-171.
-
(2005)
Eng. Applications of Artif. Intell.
, vol.18
, Issue.2
, pp. 159-171
-
-
Giorgini, P.1
Mylopoulos, J.2
Sebastiani, R.3
-
21
-
-
70350276863
-
E-government and on-line services: Security and legal patterns
-
P. Guarda, F. Massacci, and N. Zannone, E-government and on-line services: Security and legal patterns, in Proc. of MeTTeg'07, 2007.
-
(2007)
Proc. of MeTTeg'07
-
-
Guarda, P.1
Massacci, F.2
Zannone, N.3
-
23
-
-
33745244351
-
The DLV System for knowledge representation and reasoning
-
N. Leone, G. Pfeifer, W. Faber, T. Eiter, G. Gottlob, S. Perri, and F. Scarcello, The DLV System for knowledge representation and reasoning, TOCL 7(3) (2006) 499-562.
-
(2006)
TOCL
, vol.7
, Issue.3
, pp. 499-562
-
-
Leone, N.1
Pfeifer, G.2
Faber, W.3
Eiter, T.4
Gottlob, G.5
Perri, S.6
Scarcello, F.7
-
24
-
-
17044394774
-
Using abuse frames to bound the scope of security problems
-
(IEEE Press)
-
L. Lin, B. Nuseibeh, D. C. Ince, and M. Jackson, Using abuse frames to bound the scope of security problems, in Proc. of RE'04 (IEEE Press, 2004), pp. 354-355.
-
(2004)
Proc. of RE'04
, pp. 354-355
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.C.3
Jackson, M.4
-
25
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
(IEEE Press)
-
L. Liu, E. S. K. Yu, and J. Mylopoulos, Security and privacy requirements analysis within a social setting, in Proc. of RE'03 (IEEE Press, 2003), pp. 151-161.
-
(2003)
Proc. of RE'03
, pp. 151-161
-
-
Liu, L.1
Yu, E.S.K.2
Mylopoulos, J.3
-
27
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the Italian Data Protection Legislation
-
F. Massacci, M. Prest, and N. Zannone, Using a security requirements engineering methodology in practice: The compliance with the Italian Data Protection Legislation, CSI 27(5) (2005) 445-455.
-
(2005)
CSI
, vol.27
, Issue.5
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
28
-
-
33746078483
-
Detecting conflicts between functional and security requirements with secure Tropos: John Rusnak and the Allied Irish Bank
-
(MIT Press)
-
F. Massacci and N. Zannone, Detecting conflicts between functional and security requirements with secure Tropos: John Rusnak and the Allied Irish Bank, in Social Modeling for Requirements Engineering (MIT Press, 2006).
-
(2006)
Social Modeling for Requirements Engineering
-
-
Massacci, F.1
Zannone, N.2
-
29
-
-
85045573601
-
Using abuse case models for security requirements analysis
-
(IEEE Press)
-
J. McDermott and C. Fox, Using abuse case models for security requirements analysis, in Proc. of ACSAC'99 (IEEE Press, 1999), pp. 55-66.
-
(1999)
Proc. of ACSAC'99
, pp. 55-66
-
-
McDermott, J.1
Fox, C.2
-
30
-
-
70350281867
-
Web services business process execution language
-
OASIS
-
OASIS, Web Services Business Process Execution Language, Version 2.0. Public Review Draft, 2006.
-
(2006)
Version 2.0. Public Review Draft
-
-
-
31
-
-
4143147399
-
Using UML to visualize role-based access control constraints
-
(ACM Press)
-
I. Ray, N. Li, R. France, and D.-K. Kim, Using UML to visualize role-based access control constraints, in Proc. of SACMAT'04 (ACM Press, 2004), pp. 115-124.
-
(2004)
Proc. of SACMAT'04
, pp. 115-124
-
-
Ray, I.1
Li, N.2
France, R.3
Kim, D.-K.4
-
32
-
-
35048899193
-
Simple and minimum-cost satisfiability for goal models
-
Proc. of CAiSE'04. (Springer-Verlag)
-
R. Sebastiani, P. Giorgini, and J. Mylopoulos, Simple and minimum-cost satisfiability for goal models, in Proc. of CAiSE'04, LNCS 3084 (Springer-Verlag, 2004), pp. 20-35.
-
(2004)
LNCS
, vol.3084
, pp. 20-35
-
-
Sebastiani, R.1
Giorgini, P.2
Mylopoulos, J.3
-
34
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre and A. L. Opdahl, Eliciting security requirements with misuse cases, REJ 10(1) (2005) 34-44.
-
(2005)
REJ
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
35
-
-
9444250310
-
-
(NASA)
-
M. Stamatelatos, W. Vesely, J. Dugan, J. Fragola, J. Minarick, and J. Railsback, Fault Tree Handbook with Aerospace Applications (NASA, 2002).
-
(2002)
Fault Tree Handbook with Aerospace Applications
-
-
Stamatelatos, M.1
Vesely, W.2
Dugan, J.3
Fragola, J.4
Minarick, J.5
Railsback, J.6
-
36
-
-
4544255381
-
Elaborating security requirements by construction of intentional anti-models
-
(IEEE Press)
-
A. van Lamsweerde, Elaborating security requirements by construction of intentional anti-models, in Proc. of ICSE'04 (IEEE Press, 2004), pp. 148-157.
-
(2004)
Proc. of ICSE'04
, pp. 148-157
-
-
Van Lamsweerde, A.1
-
37
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
A. van Lamsweerde and E. Letier, Handling obstacles in goal-oriented requirements engineering, TSE 26(10) (2000) 978-1005.
-
(2000)
TSE
, vol.26
, Issue.10
, pp. 978-1005
-
-
Van Lamsweerde, A.1
Letier, E.2
|