메뉴 건너뛰기




Volumn 265, Issue , 2010, Pages 147-174

Security requirements engineering: The si*modeling language and the Secure Tropos methodology

Author keywords

[No Author keywords available]

Indexed keywords


EID: 73849097284     PISSN: 1860949X     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-05183-8_6     Document Type: Article
Times cited : (39)

References (56)
  • 1
    • 0003611953 scopus 로고
    • AMICE Consortium, Springer, Heidelberg
    • AMICE Consortium: Open System Architecture for CIM. Springer, Heidelberg (1993)
    • (1993) Open System Architecture for CIM
  • 3
    • 24944578141 scopus 로고    scopus 로고
    • Enterprise privacy authorization language (EPAL 1.1)
    • Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise Privacy Authorization Language (EPAL 1.1). Research Report 3485, IBM Research (2003), http://www.zurich.ibm.com/security/enterprise-privacy/epal
    • (2003) Research Report 3485
    • Ashley, P.1    Hada, S.2    Karjoth, G.3    Powers, C.4    Schunter, M.5
  • 6
    • 34548171255 scopus 로고    scopus 로고
    • From trust to dependability through risk analysis
    • IEEE Press, Los Alamitos
    • Asnar, Y., Giorgini, P., Massacci, F., Zannone, N.: From Trust to Dependability through Risk Analysis. In: Proc. of ARES 2007, pp. 19-26. IEEE Press, Los Alamitos (2007)
    • (2007) Proc. of ARES 2007 , pp. 19-26
    • Asnar, Y.1    Giorgini, P.2    Massacci, F.3    Zannone, N.4
  • 8
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: from UML Models to Access Control Infrastructures. TOSEM 15(1), 39-91 (2006)
    • (2006) TOSEM , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 9
    • 0030182473 scopus 로고    scopus 로고
    • A framework to define a generic enterprise reference architecture and methodology
    • Bernus, P., Nemes, L.: A Framework to Define a Generic Enterprise Reference Architecture and Methodology. Computer Integrated Manufacturing Systems 9(3), 179-191 (1996)
    • (1996) Computer Integrated Manufacturing Systems , vol.9 , Issue.3 , pp. 179-191
    • Bernus, P.1    Nemes, L.2
  • 12
    • 33746068596 scopus 로고    scopus 로고
    • Designing security requirements models through planning
    • Dubois, E., Pohl, K. (eds.) CAiSE 2006. Springer, Heidelberg
    • Bryl, V., Massacci, F., Mylopoulos, J., Zannone, N.: Designing Security Requirements Models through Planning. In: Dubois, E., Pohl, K. (eds.) CAiSE 2006. LNCS, vol.4001, pp. 33-47. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4001 , pp. 33-47
    • Bryl, V.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 13
    • 85041439566 scopus 로고    scopus 로고
    • Principles of trust for MAS: Cognitive anatomy, social importance and quantification
    • IEEE Press, Los Alamitos
    • Castelfranchi, C., Falcone, R.: Principles of trust for MAS: Cognitive anatomy, social importance and quantification. In: Proc. of ICMAS 1998, pp. 72-79. IEEE Press, Los Alamitos (1998)
    • (1998) Proc. of ICMAS 1998 , pp. 72-79
    • Castelfranchi, C.1    Falcone, R.2
  • 15
    • 34548045316 scopus 로고    scopus 로고
    • How to capture, communicate, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach
    • ACM Press, New York
    • Compagna, L., El Khoury, P., Massacci, F., Thomas, R., Zannone, N.: How to capture, communicate, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. In: ICAIL 2007, pp. 149-154. ACM Press, New York (2007)
    • (2007) ICAIL , vol.2007 , pp. 149-154
    • Compagna, L.1    El Khoury, P.2    Massacci, F.3    Thomas, R.4    Zannone, N.5
  • 19
    • 20444505719 scopus 로고    scopus 로고
    • MAC and UML for secure software design
    • ACM Press, New York
    • Doan, T., Demurjian, S., Ting, T.C., Ketterl, A.: MAC and UML for secure software design. In: Proc. of FMSE 2004, pp. 75-85. ACM Press, New York (2004)
    • (2004) Proc. of FMSE 2004 , pp. 75-85
    • Doan, T.1    Demurjian, S.2    Ting, T.C.3    Ketterl, A.4
  • 20
    • 38349123642 scopus 로고    scopus 로고
    • A goal oriented approach for modeling and analyzing security tradeoffs
    • Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. Springer, Heidelberg
    • Elahi, G., Yu, E.: A goal oriented approach for modeling and analyzing security tradeoffs. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol.4801, pp. 375-390. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4801 , pp. 375-390
    • Elahi, G.1    Yu, E.2
  • 21
    • 33749035450 scopus 로고    scopus 로고
    • Requirements engineering for trust management: Model, methodology, and reasoning
    • Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements Engineering for Trust Management: Model, Methodology, and Reasoning. Int. J. of Inform. Sec. 5(4), 257-274 (2006)
    • (2006) Int. J. of Inform. Sec. , vol.5 , Issue.4 , pp. 257-274
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 22
    • 84924413055 scopus 로고    scopus 로고
    • Security and trust requirements engineering
    • Aldini, A., Gorrieri, R., Martinelli, F. (eds.), FOSAD 2005. Springer, Heidelberg
    • Giorgini, P., Massacci, F., Zannone, N.: Security and Trust Requirements Engineering. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol.3655, pp. 237-272. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3655 , pp. 237-272
    • Giorgini, P.1    Massacci, F.2    Zannone, N.3
  • 23
    • 70350276863 scopus 로고    scopus 로고
    • E-government and on-line services: Security and legal patterns
    • Guarda, P., Massacci, F., Zannone, N.: E-Government and On-line Services: Security and Legal Patterns. In: Proc. of MeTTeg 2007 (2007)
    • (2007) Proc. of MeTTeg 2007
    • Guarda, P.1    Massacci, F.2    Zannone, N.3
  • 24
    • 73849125089 scopus 로고    scopus 로고
    • House of Lords: Prince Jefri Bolkiah vs KPMG. 1 All ER 517 (1999)
    • House of Lords: Prince Jefri Bolkiah vs KPMG. 1 All ER 517 (1999)
  • 25
    • 84948180066 scopus 로고    scopus 로고
    • A model for the structural, functional, and deontic specification of organizations in multiagent systems
    • Bittencourt, G., Ramalho, G.L. (eds.) SBIA 2002. Springer, Heidelberg
    • Hübner, J.F., Sichman, J.S., Boissier, O.: A Model for the Structural, Functional, and Deontic Specification of Organizations in Multiagent Systems. In: Bittencourt, G., Ramalho, G.L. (eds.) SBIA 2002. LNCS (LNAI), vol.2507, pp. 118-128. Springer, Heidelberg (2002)
    • (2002) LNCS (LNAI) , vol.2507 , pp. 118-128
    • Hübner, J.F.1    Sichman, J.S.2    Boissier, O.3
  • 27
    • 44649163185 scopus 로고    scopus 로고
    • Requirements model generation to support requirements elicitation: The secure tropos experience
    • Kiyavitskaya, N., Zannone, N.: Requirements Model Generation to Support Requirements Elicitation: The Secure Tropos Experience. In: ASE (2008)
    • (2008) ASE
    • Kiyavitskaya, N.1    Zannone, N.2
  • 29
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • Li, N., Grosof, B.N., Feigenbaum, J.: Delegation logic: A logic-based approach to distributed authorization. TISSEC 6(1), 128-171 (2003)
    • (2003) TISSEC , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 30
    • 1142293423 scopus 로고    scopus 로고
    • Analyzing security requirements as relationships among strategic actors
    • Liu, L., Yu, E., Mylopoulos, J.: Analyzing Security Requirements as Relationships Among Strategic Actors. In: Proc. of SREIS 2002 (2002)
    • (2002) Proc. of SREIS 2002
    • Liu, L.1    Yu, E.2    Mylopoulos, J.3
  • 31
    • 84942866002 scopus 로고    scopus 로고
    • Security and privacy requirements analysis within a social setting
    • IEEE Press, Los Alamitos
    • Liu, L., Yu, E.S.K., Mylopoulos, J.: Security and Privacy Requirements Analysis within a Social Setting. In: Proc. of RE 2003, pp. 151-161. IEEE Press, Los Alamitos (2003)
    • (2003) Proc. of RE 2003 , pp. 151-161
    • Liu, L.1    Yu, E.S.K.2    Mylopoulos, J.3
  • 32
    • 34548563765 scopus 로고    scopus 로고
    • Computer-aided support for secure tropos
    • Massacci, F., Mylopoulos, J., Zannone, N.: Computer-Aided Support for Secure Tropos. ASE 14(3), 341-364 (2007)
    • (2007) ASE , vol.14 , Issue.3 , pp. 341-364
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 34
    • 17744386721 scopus 로고    scopus 로고
    • Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
    • Massacci, F., Prest, M., Zannone, N.: Using a Security Requirements Engineering Methodology in Practice: The compliance with the Italian Data Protection Legislation. CSI 27(5), 445-455 (2005)
    • (2005) CSI , vol.27 , Issue.5 , pp. 445-455
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 35
    • 58049083589 scopus 로고    scopus 로고
    • A model-driven approach for the specification and analysis of access control policies
    • Meersman, R., Tari, Z. (eds.) OTM 2008. Springer, Heidelberg
    • Massacci, F., Zannone, N.: AModel-Driven Approach for the Specification and Analysis of Access Control Policies. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol.5332, pp. 1087-1103. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5332 , Issue.PART 2 , pp. 1087-1103
    • Massacci, F.1    Zannone, N.2
  • 36
    • 33746078483 scopus 로고    scopus 로고
    • Detecting conflicts between functional and security requirements with secure tropos: John Rusnak and the Allied Irish Bank
    • MIT Press, Cambridge, to appear
    • Massacci, F., Zannone, N.: Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. In: Social Modeling for Requirements Engineering. MIT Press, Cambridge (2008) (to appear)
    • (2008) Social Modeling for Requirements Engineering
    • Massacci, F.1    Zannone, N.2
  • 38
    • 85045573601 scopus 로고    scopus 로고
    • Using abuse case models for security requirements analysis
    • IEEE Press, Los Alamitos
    • McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: Proc. of ACSAC 1999, pp. 55-66. IEEE Press, Los Alamitos (1999)
    • (1999) Proc. of ACSAC 1999 , pp. 55-66
    • McDermott, J.1    Fox, C.2
  • 39
    • 0031600913 scopus 로고    scopus 로고
    • Control principles and role hierarchies
    • ACM Press, New York
    • Moffett, J.D.: Control principles and role hierarchies. In: Proc. of RBAC 1998, pp. 63-69. ACM Press, New York (1998)
    • (1998) Proc. of RBAC 1998 , pp. 63-69
    • Moffett, J.D.1
  • 40
    • 35048845022 scopus 로고    scopus 로고
    • Integrating security and systems engineering: Towards the modelling of secure information systems
    • Eder, J., Missikoff, M. (eds.). CAiSE 2003. Springer, Heidelberg
    • Mouratidis, H., Giorgini, P., Manson, G.: Integrating security and systems engineering: Towards the modelling of secure information systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol.2681, pp. 63-78. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2681 , pp. 63-78
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 43
    • 4143147399 scopus 로고    scopus 로고
    • Using UML to visualize role-based access control constraints
    • ACM Press, New York
    • Ray, I., Li, N., France, R., Kim, D.K.: Using UML to visualize role-based access control constraints. In: Proc. of SACMAT 2004, pp. 115-124. ACM Press, New York (2004)
    • (2004) Proc. of SACMAT 2004 , pp. 115-124
    • Ray, I.1    Li, N.2    France, R.3    Kim, D.K.4
  • 46
    • 33748067444 scopus 로고    scopus 로고
    • A model-checking approach to analysing organisational controls in a loan origination process
    • ACM Press, New York
    • Schaad, A., Lotz, V., Sohr, K.: A model-checking approach to analysing organisational controls in a loan origination process. In: Proc. of SACMAT 2006, pp. 139-149. ACM Press, New York (2006)
    • (2006) Proc. of SACMAT , vol.2006 , pp. 139-149
    • Schaad, A.1    Lotz, V.2    Sohr, K.3
  • 47
    • 2442519396 scopus 로고    scopus 로고
    • Separation, review and supervision controls in the context of a credit application process: A case study of organisational control principles
    • ACM Press, New York
    • Schaad, A., Moffett, J.: Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles. In: Proc. of SAC 2004, pp. 1380-1384. ACM Press, New York (2004)
    • Proc. of SAC 2004 , vol.2004 , pp. 1380-1384
    • Schaad, A.1    Moffett, J.2
  • 49
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. REJ 10(1), 34-44 (2005)
    • (2005) REJ , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 50
    • 73849098069 scopus 로고    scopus 로고
    • Results of the enterprise project
    • Stader, J.: Results of the Enterprise Project. In: Proc. of BSC SGES 1996 (1996)
    • (1996) Proc. of BSC SGES , vol.1996
    • Stader, J.1
  • 51
    • 4544255381 scopus 로고    scopus 로고
    • Elaborating security requirements by construction of intentional anti-models
    • IEEE Press, Los Alamitos
    • van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proc. of ICSE 2004, pp. 148-157. IEEE Press, Los Alamitos (2004)
    • (2004) Proc. of ICSE , vol.2004 , pp. 148-157
    • Van Lamsweerde, A.1
  • 52
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • van Lamsweerde, A., Letier, E.: Handling Obstacles in Goal-Oriented Requirements Engineering. TSE 26(10), 978-1005 (2000)
    • (2000) TSE , vol.26 , Issue.10 , pp. 978-1005
    • Van Lamsweerde, A.1    Letier, E.2
  • 53
    • 33745782245 scopus 로고    scopus 로고
    • Designing for privacy and other competing requirements
    • Yu, E., Cysneiros, L.: Designing for Privacy and Other Competing Requirements. In: Proc. of SREIS 2002 (2002)
    • (2002) Proc. of SREIS , vol.2002
    • Yu, E.1    Cysneiros, L.2
  • 56
    • 0031385980 scopus 로고    scopus 로고
    • Classification of research efforts in requirements engineering
    • Zave, P.: Classification of research efforts in requirements engineering. CSUR 29(4), 315-321 (1997).
    • (1997) CSUR , vol.29 , Issue.4 , pp. 315-321
    • Zave, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.