-
1
-
-
0003611953
-
-
AMICE Consortium, Springer, Heidelberg
-
AMICE Consortium: Open System Architecture for CIM. Springer, Heidelberg (1993)
-
(1993)
Open System Architecture for CIM
-
-
-
3
-
-
24944578141
-
Enterprise privacy authorization language (EPAL 1.1)
-
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise Privacy Authorization Language (EPAL 1.1). Research Report 3485, IBM Research (2003), http://www.zurich.ibm.com/security/enterprise-privacy/epal
-
(2003)
Research Report 3485
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
4
-
-
34548584164
-
-
Asnar, Y., Bonato, R., Bryl, V., Compagna, L., Dolinar, K., Giorgini, P., Holtmanns, S., Klobucar, T., Lanzi, P., Latanicki, J., Massacci, F., Meduri, V., Porekar, J., Riccucci, C., Saidane, A., Seguran, M., Yautsiukhin, A., Zannone, N.: Security and privacy requirements at organizational level. Research report A1.D2.1, SERENITY consortium (2006)
-
(2006)
Security and privacy requirements at organizational level. Research report A1.D2.1, SERENITY consortium
-
-
Asnar, Y.1
Bonato, R.2
Bryl, V.3
Compagna, L.4
Dolinar, K.5
Giorgini, P.6
Holtmanns, S.7
Klobucar, T.8
Lanzi, P.9
Latanicki, J.10
Massacci, F.11
Meduri, V.12
Porekar, J.13
Riccucci, C.14
Saidane, A.15
Seguran, M.16
Yautsiukhin, A.17
Zannone, N.18
-
5
-
-
47949100642
-
Secure and dependable patterns in organizations: An empirical approach
-
IEEE Press, Los Alamitos
-
Asnar, Y., Bonato, R., Giorgini, P., Massacci, F., Meduri, V., Riccucci, C., Saidane, A.: Secure and Dependable Patterns in Organizations: An Empirical Approach. In: Proc. of RE 2007, IEEE Press, Los Alamitos (2007)
-
(2007)
Proc. of RE 2007
-
-
Asnar, Y.1
Bonato, R.2
Giorgini, P.3
Massacci, F.4
Meduri, V.5
Riccucci, C.6
Saidane, A.7
-
6
-
-
34548171255
-
From trust to dependability through risk analysis
-
IEEE Press, Los Alamitos
-
Asnar, Y., Giorgini, P., Massacci, F., Zannone, N.: From Trust to Dependability through Risk Analysis. In: Proc. of ARES 2007, pp. 19-26. IEEE Press, Los Alamitos (2007)
-
(2007)
Proc. of ARES 2007
, pp. 19-26
-
-
Asnar, Y.1
Giorgini, P.2
Massacci, F.3
Zannone, N.4
-
8
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: from UML Models to Access Control Infrastructures. TOSEM 15(1), 39-91 (2006)
-
(2006)
TOSEM
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
9
-
-
0030182473
-
A framework to define a generic enterprise reference architecture and methodology
-
Bernus, P., Nemes, L.: A Framework to Define a Generic Enterprise Reference Architecture and Methodology. Computer Integrated Manufacturing Systems 9(3), 179-191 (1996)
-
(1996)
Computer Integrated Manufacturing Systems
, vol.9
, Issue.3
, pp. 179-191
-
-
Bernus, P.1
Nemes, L.2
-
10
-
-
3142750497
-
TROPOS: An agent-oriented software development methodology
-
Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: TROPOS: An Agent-Oriented Software Development Methodology. JAAMAS 8(3), 203-236 (2004)
-
(2004)
JAAMAS
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Giorgini, P.2
Giunchiglia, F.3
Mylopoulos, J.4
Perini, A.5
-
12
-
-
33746068596
-
Designing security requirements models through planning
-
Dubois, E., Pohl, K. (eds.) CAiSE 2006. Springer, Heidelberg
-
Bryl, V., Massacci, F., Mylopoulos, J., Zannone, N.: Designing Security Requirements Models through Planning. In: Dubois, E., Pohl, K. (eds.) CAiSE 2006. LNCS, vol.4001, pp. 33-47. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4001
, pp. 33-47
-
-
Bryl, V.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
13
-
-
85041439566
-
Principles of trust for MAS: Cognitive anatomy, social importance and quantification
-
IEEE Press, Los Alamitos
-
Castelfranchi, C., Falcone, R.: Principles of trust for MAS: Cognitive anatomy, social importance and quantification. In: Proc. of ICMAS 1998, pp. 72-79. IEEE Press, Los Alamitos (1998)
-
(1998)
Proc. of ICMAS 1998
, pp. 72-79
-
-
Castelfranchi, C.1
Falcone, R.2
-
14
-
-
0003696305
-
-
Kluwer Publishing, Dordrecht
-
Chung, L.K., Nixon, B.A., Yu, E.S.K.,Mylopoulos, J.: Non-Functional Requirements in Software Engineering. Kluwer Publishing, Dordrecht (2000)
-
(2000)
Non-Functional Requirements in Software Engineering
-
-
Chung, L.K.1
Nixon, B.A.2
Yu, E.S.K.3
Mylopoulos, J.4
-
15
-
-
34548045316
-
How to capture, communicate, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach
-
ACM Press, New York
-
Compagna, L., El Khoury, P., Massacci, F., Thomas, R., Zannone, N.: How to capture, communicate, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. In: ICAIL 2007, pp. 149-154. ACM Press, New York (2007)
-
(2007)
ICAIL
, vol.2007
, pp. 149-154
-
-
Compagna, L.1
El Khoury, P.2
Massacci, F.3
Thomas, R.4
Zannone, N.5
-
16
-
-
2942654159
-
The platform for privacy preferences 1.0 (P3P1.0) specification
-
Cranor, L., Langheinrich, M., Marchiori, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation (2002), http://www.w3.org/TR/P3P/
-
(2002)
W3C Recommendation
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Reagle, J.4
-
17
-
-
0027574423
-
Goal-directed requirements acquisition
-
Dardenne, A., van Lamsweerde, A., Fickas, S.: Goal-directed Requirements Acquisition. Sci. of Comp. Prog. 20, 3-50 (1993)
-
(1993)
Sci. of Comp. Prog.
, vol.20
, pp. 3-50
-
-
Dardenne, A.1
Van Lamsweerde, A.2
Fickas, S.3
-
19
-
-
20444505719
-
MAC and UML for secure software design
-
ACM Press, New York
-
Doan, T., Demurjian, S., Ting, T.C., Ketterl, A.: MAC and UML for secure software design. In: Proc. of FMSE 2004, pp. 75-85. ACM Press, New York (2004)
-
(2004)
Proc. of FMSE 2004
, pp. 75-85
-
-
Doan, T.1
Demurjian, S.2
Ting, T.C.3
Ketterl, A.4
-
20
-
-
38349123642
-
A goal oriented approach for modeling and analyzing security tradeoffs
-
Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. Springer, Heidelberg
-
Elahi, G., Yu, E.: A goal oriented approach for modeling and analyzing security tradeoffs. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol.4801, pp. 375-390. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4801
, pp. 375-390
-
-
Elahi, G.1
Yu, E.2
-
21
-
-
33749035450
-
Requirements engineering for trust management: Model, methodology, and reasoning
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements Engineering for Trust Management: Model, Methodology, and Reasoning. Int. J. of Inform. Sec. 5(4), 257-274 (2006)
-
(2006)
Int. J. of Inform. Sec.
, vol.5
, Issue.4
, pp. 257-274
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
22
-
-
84924413055
-
Security and trust requirements engineering
-
Aldini, A., Gorrieri, R., Martinelli, F. (eds.), FOSAD 2005. Springer, Heidelberg
-
Giorgini, P., Massacci, F., Zannone, N.: Security and Trust Requirements Engineering. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol.3655, pp. 237-272. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3655
, pp. 237-272
-
-
Giorgini, P.1
Massacci, F.2
Zannone, N.3
-
24
-
-
73849125089
-
-
House of Lords: Prince Jefri Bolkiah vs KPMG. 1 All ER 517 (1999)
-
House of Lords: Prince Jefri Bolkiah vs KPMG. 1 All ER 517 (1999)
-
-
-
-
25
-
-
84948180066
-
A model for the structural, functional, and deontic specification of organizations in multiagent systems
-
Bittencourt, G., Ramalho, G.L. (eds.) SBIA 2002. Springer, Heidelberg
-
Hübner, J.F., Sichman, J.S., Boissier, O.: A Model for the Structural, Functional, and Deontic Specification of Organizations in Multiagent Systems. In: Bittencourt, G., Ramalho, G.L. (eds.) SBIA 2002. LNCS (LNAI), vol.2507, pp. 118-128. Springer, Heidelberg (2002)
-
(2002)
LNCS (LNAI)
, vol.2507
, pp. 118-128
-
-
Hübner, J.F.1
Sichman, J.S.2
Boissier, O.3
-
27
-
-
44649163185
-
Requirements model generation to support requirements elicitation: The secure tropos experience
-
Kiyavitskaya, N., Zannone, N.: Requirements Model Generation to Support Requirements Elicitation: The Secure Tropos Experience. In: ASE (2008)
-
(2008)
ASE
-
-
Kiyavitskaya, N.1
Zannone, N.2
-
28
-
-
33745244351
-
The DLV system for knowledge representation and reasoning
-
Leone, N., Pfeifer, G., Faber, W., Eiter, T., Gottlob, G., Perri, S., Scarcello, F.: The DLV System for Knowledge Representation and Reasoning. TOCL 7(3), 499-562 (2006)
-
(2006)
TOCL
, vol.7
, Issue.3
, pp. 499-562
-
-
Leone, N.1
Pfeifer, G.2
Faber, W.3
Eiter, T.4
Gottlob, G.5
Perri, S.6
Scarcello, F.7
-
29
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Li, N., Grosof, B.N., Feigenbaum, J.: Delegation logic: A logic-based approach to distributed authorization. TISSEC 6(1), 128-171 (2003)
-
(2003)
TISSEC
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
30
-
-
1142293423
-
Analyzing security requirements as relationships among strategic actors
-
Liu, L., Yu, E., Mylopoulos, J.: Analyzing Security Requirements as Relationships Among Strategic Actors. In: Proc. of SREIS 2002 (2002)
-
(2002)
Proc. of SREIS 2002
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
31
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
IEEE Press, Los Alamitos
-
Liu, L., Yu, E.S.K., Mylopoulos, J.: Security and Privacy Requirements Analysis within a Social Setting. In: Proc. of RE 2003, pp. 151-161. IEEE Press, Los Alamitos (2003)
-
(2003)
Proc. of RE 2003
, pp. 151-161
-
-
Liu, L.1
Yu, E.S.K.2
Mylopoulos, J.3
-
32
-
-
34548563765
-
Computer-aided support for secure tropos
-
Massacci, F., Mylopoulos, J., Zannone, N.: Computer-Aided Support for Secure Tropos. ASE 14(3), 341-364 (2007)
-
(2007)
ASE
, vol.14
, Issue.3
, pp. 341-364
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
34
-
-
17744386721
-
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
-
Massacci, F., Prest, M., Zannone, N.: Using a Security Requirements Engineering Methodology in Practice: The compliance with the Italian Data Protection Legislation. CSI 27(5), 445-455 (2005)
-
(2005)
CSI
, vol.27
, Issue.5
, pp. 445-455
-
-
Massacci, F.1
Prest, M.2
Zannone, N.3
-
35
-
-
58049083589
-
A model-driven approach for the specification and analysis of access control policies
-
Meersman, R., Tari, Z. (eds.) OTM 2008. Springer, Heidelberg
-
Massacci, F., Zannone, N.: AModel-Driven Approach for the Specification and Analysis of Access Control Policies. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol.5332, pp. 1087-1103. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5332
, Issue.PART 2
, pp. 1087-1103
-
-
Massacci, F.1
Zannone, N.2
-
36
-
-
33746078483
-
Detecting conflicts between functional and security requirements with secure tropos: John Rusnak and the Allied Irish Bank
-
MIT Press, Cambridge, to appear
-
Massacci, F., Zannone, N.: Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. In: Social Modeling for Requirements Engineering. MIT Press, Cambridge (2008) (to appear)
-
(2008)
Social Modeling for Requirements Engineering
-
-
Massacci, F.1
Zannone, N.2
-
37
-
-
0042495505
-
An integrative model of organizational trust
-
Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Management Rev. 20(3), 709-734 (1995)
-
(1995)
Acad. Management Rev.
, vol.20
, Issue.3
, pp. 709-734
-
-
Mayer, R.C.1
Davis, J.H.2
Schoorman, F.D.3
-
38
-
-
85045573601
-
Using abuse case models for security requirements analysis
-
IEEE Press, Los Alamitos
-
McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: Proc. of ACSAC 1999, pp. 55-66. IEEE Press, Los Alamitos (1999)
-
(1999)
Proc. of ACSAC 1999
, pp. 55-66
-
-
McDermott, J.1
Fox, C.2
-
39
-
-
0031600913
-
Control principles and role hierarchies
-
ACM Press, New York
-
Moffett, J.D.: Control principles and role hierarchies. In: Proc. of RBAC 1998, pp. 63-69. ACM Press, New York (1998)
-
(1998)
Proc. of RBAC 1998
, pp. 63-69
-
-
Moffett, J.D.1
-
40
-
-
35048845022
-
Integrating security and systems engineering: Towards the modelling of secure information systems
-
Eder, J., Missikoff, M. (eds.). CAiSE 2003. Springer, Heidelberg
-
Mouratidis, H., Giorgini, P., Manson, G.: Integrating security and systems engineering: Towards the modelling of secure information systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol.2681, pp. 63-78. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2681
, pp. 63-78
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
42
-
-
73849116216
-
-
Allfirst Financial Inc., and Allfirst Bank Concerning Currency Trading Losses
-
Promontory Financial Group, Wachtell, Lipton, Rosen, Katz: Report to the Board and Directors of Allied Irish Bank P.L.C., Allfirst Financial Inc., and Allfirst Bank Concerning Currency Trading Losses (2003)
-
(2003)
Report to the Board and Directors of Allied Irish Bank P.L.C.
-
-
Financial Group, P.1
Lipton, W.2
Katz, R.3
-
43
-
-
4143147399
-
Using UML to visualize role-based access control constraints
-
ACM Press, New York
-
Ray, I., Li, N., France, R., Kim, D.K.: Using UML to visualize role-based access control constraints. In: Proc. of SACMAT 2004, pp. 115-124. ACM Press, New York (2004)
-
(2004)
Proc. of SACMAT 2004
, pp. 115-124
-
-
Ray, I.1
Li, N.2
France, R.3
Kim, D.K.4
-
45
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Comp. 29(2), 38-47 (1996)
-
(1996)
IEEE Comp.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
46
-
-
33748067444
-
A model-checking approach to analysing organisational controls in a loan origination process
-
ACM Press, New York
-
Schaad, A., Lotz, V., Sohr, K.: A model-checking approach to analysing organisational controls in a loan origination process. In: Proc. of SACMAT 2006, pp. 139-149. ACM Press, New York (2006)
-
(2006)
Proc. of SACMAT
, vol.2006
, pp. 139-149
-
-
Schaad, A.1
Lotz, V.2
Sohr, K.3
-
47
-
-
2442519396
-
Separation, review and supervision controls in the context of a credit application process: A case study of organisational control principles
-
ACM Press, New York
-
Schaad, A., Moffett, J.: Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles. In: Proc. of SAC 2004, pp. 1380-1384. ACM Press, New York (2004)
-
Proc. of SAC 2004
, vol.2004
, pp. 1380-1384
-
-
Schaad, A.1
Moffett, J.2
-
48
-
-
33750050331
-
-
JohnWiley & Sons, Chichester
-
Schumacher, M., Fernandez, E.B., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns - Integrating Security and Systems Engineering. JohnWiley & Sons, Chichester (2005)
-
(2005)
Security Patterns - Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
49
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. REJ 10(1), 34-44 (2005)
-
(2005)
REJ
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
50
-
-
73849098069
-
Results of the enterprise project
-
Stader, J.: Results of the Enterprise Project. In: Proc. of BSC SGES 1996 (1996)
-
(1996)
Proc. of BSC SGES
, vol.1996
-
-
Stader, J.1
-
51
-
-
4544255381
-
Elaborating security requirements by construction of intentional anti-models
-
IEEE Press, Los Alamitos
-
van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proc. of ICSE 2004, pp. 148-157. IEEE Press, Los Alamitos (2004)
-
(2004)
Proc. of ICSE
, vol.2004
, pp. 148-157
-
-
Van Lamsweerde, A.1
-
52
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
van Lamsweerde, A., Letier, E.: Handling Obstacles in Goal-Oriented Requirements Engineering. TSE 26(10), 978-1005 (2000)
-
(2000)
TSE
, vol.26
, Issue.10
, pp. 978-1005
-
-
Van Lamsweerde, A.1
Letier, E.2
-
53
-
-
33745782245
-
Designing for privacy and other competing requirements
-
Yu, E., Cysneiros, L.: Designing for Privacy and Other Competing Requirements. In: Proc. of SREIS 2002 (2002)
-
(2002)
Proc. of SREIS
, vol.2002
-
-
Yu, E.1
Cysneiros, L.2
-
56
-
-
0031385980
-
Classification of research efforts in requirements engineering
-
Zave, P.: Classification of research efforts in requirements engineering. CSUR 29(4), 315-321 (1997).
-
(1997)
CSUR
, vol.29
, Issue.4
, pp. 315-321
-
-
Zave, P.1
|