메뉴 건너뛰기




Volumn , Issue , 2010, Pages 88-97

Model-based argument analysis for evolving security requirements

Author keywords

Event calculus; Evolution; OpenPF; Requirements engineering; Security argumentation

Indexed keywords

AIR TRAFFIC CONTROL; CALCULATIONS; CRYPTOGRAPHY;

EID: 77954833400     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SSIRI.2010.36     Document Type: Conference Paper
Times cited : (12)

References (36)
  • 2
    • 0034188338 scopus 로고    scopus 로고
    • A reference model for requirements and specifications
    • C. A. Gunter, E. L. Gunter, M. Jackson, and P. Zave, "A reference model for requirements and specifications," IEEE Softw., vol. 17, no. 3, pp. 37-43, 2000.
    • (2000) IEEE Softw. , vol.17 , Issue.3 , pp. 37-43
    • Gunter, C.A.1    Gunter, E.L.2    Jackson, M.3    Zave, P.4
  • 3
    • 0029387560 scopus 로고
    • Functional documents for computer systems
    • D. L. Parnas and J. Madey, "Functional documents for computer systems," Sci. Comput. Program., vol. 25, no. 1, pp. 41-61, 1995.
    • (1995) Sci. Comput. Program. , vol.25 , Issue.1 , pp. 41-61
    • Parnas, D.L.1    Madey, J.2
  • 8
    • 77954833995 scopus 로고    scopus 로고
    • A modeling ontology for integrating vulnerabilities into security requirements conceptual foundations
    • ER, ser. A. H. F. Laender, S. Castano, U. Dayal, F. Casati, and J. P. M. de Oliveira, Eds., Springer
    • G. Elahi, E. S. K. Yu, and N. Zannone, "A modeling ontology for integrating vulnerabilities into security requirements conceptual foundations," in ER, ser. Lecture Notes in Computer Science, A. H. F. Laender, S. Castano, U. Dayal, F. Casati, and J. P. M. de Oliveira, Eds., vol. 5829. Springer, 2009, pp. 99-114.
    • (2009) Lecture Notes in Computer Science , vol.5829 , pp. 99-114
    • Elahi, G.1    Yu, E.S.K.2    Zannone, N.3
  • 14
    • 80455177412 scopus 로고    scopus 로고
    • Security requirements engineering for evolving software systems: A survey
    • A. Nhlabatsi, B. Nuseibeh, and Y. Yu, "Security requirements engineering for evolving software systems: A survey," Journal of Secure Software Engineering, vol. 1, pp. 54-73, 2009.
    • (2009) Journal of Secure Software Engineering , vol.1 , pp. 54-73
    • Nhlabatsi, A.1    Nuseibeh, B.2    Yu, Y.3
  • 16
    • 0012168491 scopus 로고    scopus 로고
    • Software change impact analysis
    • R. S. Arnold, "Software change impact analysis," Computer, 1996.
    • (1996) Computer
    • Arnold, R.S.1
  • 17
    • 0033163707 scopus 로고    scopus 로고
    • An empirical approach to studying software evolution
    • C. F. Kemerer and S. Slaughter, "An empirical approach to studying software evolution," IEEE Trans. Softw. Eng., vol. 25, pp. 493-509, 1999.
    • (1999) IEEE Trans. Softw. Eng. , vol.25 , pp. 493-509
    • Kemerer, C.F.1    Slaughter, S.2
  • 19
    • 0032083407 scopus 로고    scopus 로고
    • Version models for software configuration management
    • R. Conradi and B. Westfechtel, "Version models for software configuration management," ACM Comput. Surv., vol. 30, pp. 232-282, 1998.
    • (1998) ACM Comput. Surv. , vol.30 , pp. 232-282
    • Conradi, R.1    Westfechtel, B.2
  • 20
    • 0032665183 scopus 로고    scopus 로고
    • An architecture- Based approach to self-adaptive software
    • Medvidovic, A. Quilici, D. S. Rosenblum, and A. L. Wolf, "An architecture- based approach to self-adaptive software," IEEE Intelligent Systems, vol. 14, pp. 54-62, 1999.
    • (1999) IEEE Intelligent Systems , vol.14 , pp. 54-62
    • Medvidovic, A.Q.1    Rosenblum, D.S.2    Wolf, A.L.3
  • 23
    • 0030085657 scopus 로고    scopus 로고
    • Software change management
    • C. Jones, "Software change management," Computer, vol. 29, pp. 80-82, 1996.
    • (1996) Computer , vol.29 , pp. 80-82
    • Jones, C.1
  • 30
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • C. B. Haley, R. C. Laney, J. D. Moffett, and B. Nuseibeh, "Security requirements engineering: A framework for representation and analysis," IEEE Trans. Software Eng., vol. 34, pp. 133-153, 2008.
    • (2008) IEEE Trans. Software Eng. , vol.34 , pp. 133-153
    • Haley, C.B.1    Laney, R.C.2    Moffett, J.D.3    Nuseibeh, B.4
  • 31
    • 0022605949 scopus 로고
    • A logic-based calculus of events
    • R. Kowalski and M. Sergot, "A logic-based calculus of events," New Gen. Comput., vol. 4, no. 1, pp. 67-95, 1986.
    • (1986) New Gen. Comput. , vol.4 , Issue.1 , pp. 67-95
    • Kowalski, R.1    Sergot, M.2
  • 32
  • 34
    • 0003633770 scopus 로고
    • papers by John McCarthy edited by V. Lifschitz. Ablex
    • J. McCarthy, Formalization of common sense, papers by John McCarthy edited by V. Lifschitz. Ablex, 1990.
    • (1990) Formalization of Common Sense
    • McCarthy, J.1
  • 35
    • 0020910824 scopus 로고    scopus 로고
    • What good is temporal logic?
    • L. Lamport, "What good is temporal logic?" in IFIP Congress, 1983, pp. 657-668.
    • IFIP Congress, 1983 , pp. 657-668
    • Lamport, L.1
  • 36
    • 0031221255 scopus 로고    scopus 로고
    • Stutter-invariant temporal properties are expressible without the next-time operator
    • D. Peled and T. Wilke, "Stutter-invariant temporal properties are expressible without the next-time operator," Inf. Process. Lett., vol. 63, no. 5, pp. 243-246, 1997.
    • (1997) Inf. Process. Lett. , vol.63 , Issue.5 , pp. 243-246
    • Peled, D.1    Wilke, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.