메뉴 건너뛰기




Volumn 19, Issue 5, 2009, Pages 727-746

The si* modeling framework: Metamodel and applications

Author keywords

Agent oriented software; Requirements engineering; Security engineering; Socio technical systems

Indexed keywords

AGENT-ORIENTED SOFTWARE; BUSINESS PROCESS; DESIGN ALTERNATIVES; DEVELOPMENT ENVIRONMENT; META MODEL; MODELING FRAMEWORKS; MODELING LANGUAGES; SECURITY ENGINEERING; SECURITY REQUIREMENTS ENGINEERING; SOCIO-TECHNICAL SYSTEMS; SYSTEM DEVELOPMENT PROCESS;

EID: 70350322328     PISSN: 02181940     EISSN: None     Source Type: Journal    
DOI: 10.1142/S0218194009004374     Document Type: Article
Times cited : (3)

References (38)
  • 1
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • R. Anderson, Why cryptosystems fail, CACM 37(11) (1994) 32-40.
    • (1994) CACM , vol.37 , Issue.11 , pp. 32-40
    • Anderson, R.1
  • 2
    • 45849138846 scopus 로고    scopus 로고
    • Modelling risk and identifying countermeasures in organizations
    • Y. Asnar and P. Giorgini, Modelling risk and identifying countermeasures in organizations, in Proc. of CRITIS'06, 2006.
    • (2006) Proc. of CRITIS'06
    • Asnar, Y.1    Giorgini, P.2
  • 5
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • D. Basin, J. Doser, and T. Lodderstedt, Model driven security: From UML models to access control infrastructures, TOSEM 15(1) (2006) 39-91.
    • (2006) TOSEM , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 7
    • 33746068596 scopus 로고    scopus 로고
    • Designing security requirements models through planning
    • Proc. of CAiSE'06. (Springer-Verlag)
    • V. Bryl, F. Massacci, J. Mylopoulos, and N. Zannone, Designing security requirements models through planning, in Proc. of CAiSE'06, LNCS 4001 (Springer-Verlag, 2006), pp. 33-47.
    • (2006) LNCS , vol.4001 , pp. 33-47
    • Bryl, V.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 9
    • 34548045316 scopus 로고    scopus 로고
    • How to capture, communicate, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach
    • (ACM Press)
    • L. Compagna, P. E. Khoury, F. Massacci, R. Thomas, and N. Zannone, How to capture, communicate, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach, in Proc. of ICAIL'07 (ACM Press, 2007), pp. 149-154.
    • (2007) Proc. of ICAIL'07 , pp. 149-154
    • Compagna, L.1    Khoury, P.E.2    Massacci, F.3    Thomas, R.4    Zannone, N.5
  • 10
    • 84948972584 scopus 로고    scopus 로고
    • Security requirements engineering: When anti-requirements hit the fan
    • (IEEE Press)
    • R. Crook, D. Ince, L. Lin, and B. Nuseibeh, Security requirements engineering: When anti-requirements hit the fan, in Proc. of RE'02 (IEEE Press, 2002), pp. 203-205.
    • (2002) Proc. of RE'02 , pp. 203-205
    • Crook, R.1    Ince, D.2    Lin, L.3    Nuseibeh, B.4
  • 13
    • 33745641865 scopus 로고    scopus 로고
    • Foundations of meta-pyramids: Languages vs. metamodels - Episode II: Story of Thotus the baboon
    • no. 04101, IBFI, Schloss Dagstuhl, Germany
    • J.-M. Favre, Foundations of meta-pyramids: Languages vs. metamodels - episode II: Story of Thotus the baboon, in Language Engineering for Model-Driven Software Development, Dagstuhl Seminar Proceedings, no.04101, IBFI, Schloss Dagstuhl, Germany, 2005.
    • (2005) Language Engineering for Model-Driven Software Development, Dagstuhl Seminar Proceedings
    • Favre, J.-M.1
  • 14
    • 13244278129 scopus 로고    scopus 로고
    • Applications of tool support for risk-informed requirements reasoning
    • M. S. Feather, S. L. Cornford, K. A. Hicks, and K. R. Johnson, Applications of tool support for risk-informed requirements reasoning, Comput. Syst. Sci. Eng. 20(1) (2005) 5-17.
    • (2005) Comput. Syst. Sci. Eng. , vol.20 , Issue.1 , pp. 5-17
    • Feather, M.S.1    Cornford, S.L.2    Hicks, K.A.3    Johnson, K.R.4
  • 15
    • 36648999170 scopus 로고    scopus 로고
    • From early requirements analysis towards secure workflows
    • The full version appears as Technical Report, DIT- 07-036, at
    • G. Frankova, F. Massacci, and M. Seguran, From early requirements analysis towards secure workflows, in Proc. of IFIPTM'07, 2007. The full version appears as Technical Report, DIT-07-036, at http://eprints.biblio.unitn.it/ archive/00001220/.
    • (2007) Proc. of IFIPTM'07
    • Frankova, G.1    Massacci, F.2    Seguran, M.3
  • 16
    • 27644432492 scopus 로고    scopus 로고
    • Modeling the impact of trust and distrust in agent networks
    • G. Gans, M. Jarke, S. Kethers, and G. Lakemeyer. Modeling the impact of trust and distrust in agent networks, in Proc. of AOIS'01, 2001, pp. 45-58.
    • (2001) Proc. of AOIS'01 , pp. 45-58
    • Gans, G.1    Jarke, M.2    Kethers, S.3    Lakemeyer., G.4
  • 17
    • 24944578244 scopus 로고    scopus 로고
    • Modelling social and individual trust in requirements engineering methodologies
    • Proc. of iTrust'05. (Springer-Verlag)
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, Modelling social and individual trust in requirements engineering methodologies, in Proc. of iTrust'05, LNCS 3477 (Springer-Verlag, 2005), pp. 161-176.
    • (2005) LNCS , vol.3477 , pp. 161-176
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 19
    • 84924413055 scopus 로고    scopus 로고
    • Security and trust requirements engineering
    • FOSAD 2004/ 2005. (Springer-Verlag)
    • P. Giorgini, F. Massacci, and N. Zannone, Security and trust requirements engineering, in FOSAD 2004/2005, LNCS 3655 (Springer-Verlag, 2005), pp. 237-272.
    • (2005) LNCS , vol.3655 , pp. 237-272
    • Giorgini, P.1    Massacci, F.2    Zannone, N.3
  • 20
    • 13844255590 scopus 로고    scopus 로고
    • Goal-oriented requirements analysis and reasoning in the Tropos methodology
    • P. Giorgini, J. Mylopoulos, and R. Sebastiani, Goal-oriented requirements analysis and reasoning in the Tropos methodology, Eng. Applications of Artif. Intell. 18(2) (2005) 159-171.
    • (2005) Eng. Applications of Artif. Intell. , vol.18 , Issue.2 , pp. 159-171
    • Giorgini, P.1    Mylopoulos, J.2    Sebastiani, R.3
  • 21
    • 70350276863 scopus 로고    scopus 로고
    • E-government and on-line services: Security and legal patterns
    • P. Guarda, F. Massacci, and N. Zannone, E-government and on-line services: Security and legal patterns, in Proc. of MeTTeg'07, 2007.
    • (2007) Proc. of MeTTeg'07
    • Guarda, P.1    Massacci, F.2    Zannone, N.3
  • 24
    • 17044394774 scopus 로고    scopus 로고
    • Using abuse frames to bound the scope of security problems
    • (IEEE Press)
    • L. Lin, B. Nuseibeh, D. C. Ince, and M. Jackson, Using abuse frames to bound the scope of security problems, in Proc. of RE'04 (IEEE Press, 2004), pp. 354-355.
    • (2004) Proc. of RE'04 , pp. 354-355
    • Lin, L.1    Nuseibeh, B.2    Ince, D.C.3    Jackson, M.4
  • 25
    • 84942866002 scopus 로고    scopus 로고
    • Security and privacy requirements analysis within a social setting
    • (IEEE Press)
    • L. Liu, E. S. K. Yu, and J. Mylopoulos, Security and privacy requirements analysis within a social setting, in Proc. of RE'03 (IEEE Press, 2003), pp. 151-161.
    • (2003) Proc. of RE'03 , pp. 151-161
    • Liu, L.1    Yu, E.S.K.2    Mylopoulos, J.3
  • 27
    • 17744386721 scopus 로고    scopus 로고
    • Using a security requirements engineering methodology in practice: The compliance with the Italian Data Protection Legislation
    • F. Massacci, M. Prest, and N. Zannone, Using a security requirements engineering methodology in practice: The compliance with the Italian Data Protection Legislation, CSI 27(5) (2005) 445-455.
    • (2005) CSI , vol.27 , Issue.5 , pp. 445-455
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 28
    • 33746078483 scopus 로고    scopus 로고
    • Detecting conflicts between functional and security requirements with secure Tropos: John Rusnak and the Allied Irish Bank
    • (MIT Press)
    • F. Massacci and N. Zannone, Detecting conflicts between functional and security requirements with secure Tropos: John Rusnak and the Allied Irish Bank, in Social Modeling for Requirements Engineering (MIT Press, 2006).
    • (2006) Social Modeling for Requirements Engineering
    • Massacci, F.1    Zannone, N.2
  • 29
    • 85045573601 scopus 로고    scopus 로고
    • Using abuse case models for security requirements analysis
    • (IEEE Press)
    • J. McDermott and C. Fox, Using abuse case models for security requirements analysis, in Proc. of ACSAC'99 (IEEE Press, 1999), pp. 55-66.
    • (1999) Proc. of ACSAC'99 , pp. 55-66
    • McDermott, J.1    Fox, C.2
  • 30
    • 70350281867 scopus 로고    scopus 로고
    • Web services business process execution language
    • OASIS
    • OASIS, Web Services Business Process Execution Language, Version 2.0. Public Review Draft, 2006.
    • (2006) Version 2.0. Public Review Draft
  • 31
    • 4143147399 scopus 로고    scopus 로고
    • Using UML to visualize role-based access control constraints
    • (ACM Press)
    • I. Ray, N. Li, R. France, and D.-K. Kim, Using UML to visualize role-based access control constraints, in Proc. of SACMAT'04 (ACM Press, 2004), pp. 115-124.
    • (2004) Proc. of SACMAT'04 , pp. 115-124
    • Ray, I.1    Li, N.2    France, R.3    Kim, D.-K.4
  • 32
    • 35048899193 scopus 로고    scopus 로고
    • Simple and minimum-cost satisfiability for goal models
    • Proc. of CAiSE'04. (Springer-Verlag)
    • R. Sebastiani, P. Giorgini, and J. Mylopoulos, Simple and minimum-cost satisfiability for goal models, in Proc. of CAiSE'04, LNCS 3084 (Springer-Verlag, 2004), pp. 20-35.
    • (2004) LNCS , vol.3084 , pp. 20-35
    • Sebastiani, R.1    Giorgini, P.2    Mylopoulos, J.3
  • 34
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre and A. L. Opdahl, Eliciting security requirements with misuse cases, REJ 10(1) (2005) 34-44.
    • (2005) REJ , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 36
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating security requirements by construction of intentional anti-models
    • (IEEE Press)
    • A. van Lamsweerde, Elaborating security requirements by construction of intentional anti-models, in Proc. of ICSE'04 (IEEE Press, 2004), pp. 148-157.
    • (2004) Proc. of ICSE'04 , pp. 148-157
    • Van Lamsweerde, A.1
  • 37
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • A. van Lamsweerde and E. Letier, Handling obstacles in goal-oriented requirements engineering, TSE 26(10) (2000) 978-1005.
    • (2000) TSE , vol.26 , Issue.10 , pp. 978-1005
    • Van Lamsweerde, A.1    Letier, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.