메뉴 건너뛰기




Volumn , Issue , 2009, Pages 33-38

Legal patterns implement trust in IT requirements: When legal means are the "best" implementation of IT technical goals

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENTISTS; ORGANIZATIONAL PATTERN; REQUIREMENTS ANALYST; SOFTWARE PATTERNS; TECHNICAL SOLUTIONS;

EID: 77952979623     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RELAW.2009.7     Document Type: Conference Paper
Times cited : (2)

References (17)
  • 4
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • T. Breaux and A. Anton. Analyzing regulatory rules for privacy and security requirements. TSE, 34(1):5-20, 2008.
    • (2008) TSE , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.1    Anton, A.2
  • 5
    • 77953005868 scopus 로고    scopus 로고
    • A distributed requirements management framework for legal compliance and accountability
    • To appear
    • T. Breaux, A. Anton, and E. Spafford. A distributed requirements management framework for legal compliance and accountability. Comp. & Sec., 2007. To appear.
    • (2007) Comp. & Sec.
    • Breaux, T.1    Anton, A.2    Spafford, E.3
  • 6
    • 34548045316 scopus 로고    scopus 로고
    • How to capture, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach
    • L. Compagna, P. E. Khoury, F. Massacci, R. Thomas, and N. Zannone. How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. In Proc. of ICAIL '07, 2007.
    • Proc. of ICAIL '07, 2007
    • Compagna, L.1    Khoury, P.E.2    Massacci, F.3    Thomas, R.4    Zannone, N.5
  • 8
    • 33749035450 scopus 로고    scopus 로고
    • Requirements engineering for trust management: Model, methodology, and reasoning
    • P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Requirements engineering for trust management: Model, methodology, and reasoning. IJIS, 5(4):257-274, 2006.
    • (2006) IJIS , vol.5 , Issue.4 , pp. 257-274
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3    Zannone, N.4
  • 9
    • 17744386721 scopus 로고    scopus 로고
    • Using a security requirements engineering methodology in practice: The compliance with the italian data protection legislation
    • F. Massacci, M. Prest, and N. Zannone. Using a security requirements engineering methodology in practice: The compliance with the italian data protection legislation. Comp. Standards&Interfaces, 27(5):445-455, 2005.
    • (2005) Comp. Standards&Interfaces , vol.27 , Issue.5 , pp. 445-455
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 10
    • 77952994638 scopus 로고    scopus 로고
    • Security patterns meet agent oriented software engineering: A complementary solution for developing security information systems
    • H. Mouratidis, M. Weiss, and P. Giorgini. Security patterns meet agent oriented software engineering: a complementary solution for developing security information systems. In Proc. of ER'05, 2005.
    • Proc. of ER'05, 2005
    • Mouratidis, H.1    Weiss, M.2    Giorgini, P.3
  • 11
    • 84884396139 scopus 로고    scopus 로고
    • The Role of Logic in Computational Models of Legal Argument: A Critical Survey
    • Computational Logic: Logic Programming and Beyond, Springer-Verlag
    • H. Prakken and G. Sartor. The Role of Logic in Computational Models of Legal Argument: A Critical Survey. In Computational Logic: Logic Programming and Beyond, volume 2408 of LNCS, pages 342-381. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2408 , pp. 342-381
    • Prakken, H.1    Sartor, G.2
  • 15
    • 33750069781 scopus 로고    scopus 로고
    • Architectural Patterns for Enabling Application Security
    • J. Yoder and J. Barcalow. Architectural Patterns for Enabling Application Security. In Proc. of PLoP'97, 1997.
    • Proc. of PLoP'97, 1997
    • Yoder, J.1    Barcalow, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.