-
2
-
-
0034188338
-
A reference model for requirements and specifications
-
C. A. Gunter, E. L. Gunter, M. Jackson, and P. Zave, "A reference model for requirements and specifications," IEEE Softw., vol. 17, no. 3, pp. 37-43, 2000.
-
(2000)
IEEE Softw.
, vol.17
, Issue.3
, pp. 37-43
-
-
Gunter, C.A.1
Gunter, E.L.2
Jackson, M.3
Zave, P.4
-
3
-
-
0029387560
-
Functional documents for computer systems
-
D. L. Parnas and J. Madey, "Functional documents for computer systems," Sci. Comput. Program., vol. 25, no. 1, pp. 41-61, 1995.
-
(1995)
Sci. Comput. Program.
, vol.25
, Issue.1
, pp. 41-61
-
-
Parnas, D.L.1
Madey, J.2
-
4
-
-
58149173386
-
Revisiting the core ontology and problem in requirements engineering
-
Washington, DC, USA: IEEE Computer Society
-
I. Jureta, J. Mylopoulos, and S. Faulkner, "Revisiting the core ontology and problem in requirements engineering," in RE '08: Proceedings of the 2008 16th IEEE International Requirements Engineering Conference. Washington, DC, USA: IEEE Computer Society, 2008, pp. 71-80.
-
(2008)
RE '08: Proceedings of the 2008 16th IEEE International Requirements Engineering Conference
, pp. 71-80
-
-
Jureta, I.1
Mylopoulos, J.2
Faulkner, S.3
-
5
-
-
77954828219
-
Meta-models for misuse cases
-
New York, NY, USA: ACM
-
M. Hartong, R. Goel, and D. Wijesekera, "Meta-models for misuse cases," in CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research. New York, NY, USA: ACM, 2009, pp. 1-4.
-
(2009)
CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research
, pp. 1-4
-
-
Hartong, M.1
Goel, R.2
Wijesekera, D.3
-
6
-
-
29844451321
-
The tropos metamodel and its use
-
A. Susi, A. Perini, J. Mylopoulos, and P. Giorgini, "The tropos metamodel and its use," Informatica (Slovenia), vol. 29, no. 4, pp. 401-408, 2005.
-
(2005)
Informatica (Slovenia)
, vol.29
, Issue.4
, pp. 401-408
-
-
Susi, A.1
Perini, A.2
Mylopoulos, J.3
Giorgini, P.4
-
7
-
-
4544255381
-
Elaborating security requirements by construction of intentional anti-models
-
Washington, DC, USA: IEEE Computer Society
-
A. van Lamsweerde, "Elaborating security requirements by construction of intentional anti-models," in ICSE '04: Proceedings of the 26th International Conference on Software Engineering. Washington, DC, USA: IEEE Computer Society, 2004, pp. 148-157.
-
(2004)
ICSE '04: Proceedings of the 26th International Conference on Software Engineering
, pp. 148-157
-
-
Van Lamsweerde, A.1
-
8
-
-
77954833995
-
A modeling ontology for integrating vulnerabilities into security requirements conceptual foundations
-
ER, ser. A. H. F. Laender, S. Castano, U. Dayal, F. Casati, and J. P. M. de Oliveira, Eds., Springer
-
G. Elahi, E. S. K. Yu, and N. Zannone, "A modeling ontology for integrating vulnerabilities into security requirements conceptual foundations," in ER, ser. Lecture Notes in Computer Science, A. H. F. Laender, S. Castano, U. Dayal, F. Casati, and J. P. M. de Oliveira, Eds., vol. 5829. Springer, 2009, pp. 99-114.
-
(2009)
Lecture Notes in Computer Science
, vol.5829
, pp. 99-114
-
-
Elahi, G.1
Yu, E.S.K.2
Zannone, N.3
-
9
-
-
60849119260
-
A security-aware metamodel for multi-agent systems (mas)
-
G. Beydoun, G. Low, H. Mouratidis, and B. Henderson- Sellers, "A security-aware metamodel for multi-agent systems (mas)," Inf. Softw. Technol., vol. 51, no. 5, pp. 832-845, 2009.
-
(2009)
Inf. Softw. Technol.
, vol.51
, Issue.5
, pp. 832-845
-
-
Beydoun, G.1
Low, G.2
Mouratidis, H.3
Henderson- Sellers, B.4
-
10
-
-
48049090002
-
A taxonomy of information security for service-centric systems
-
Washington, DC, USA: IEEE Computer Society
-
P. Savolainen, E. Niemela, and R. Savola, "A taxonomy of information security for service-centric systems," in EUROMICRO '07: Proceedings of the 33rd EUROMICRO Conference on Software Engineering and Advanced Applications. Washington, DC, USA: IEEE Computer Society, 2007, pp. 5-12.
-
(2007)
EUROMICRO '07: Proceedings of the 33rd EUROMICRO Conference on Software Engineering and Advanced Applications
, pp. 5-12
-
-
Savolainen, P.1
Niemela, E.2
Savola, R.3
-
11
-
-
84953384559
-
Building problem domain ontology from security requirements in regulatory documents
-
New York, NY, USA: ACM
-
S.-W. Lee, R. Gandhi, D. Muthurajan, D. Yavagal, and G.-J. Ahn, "Building problem domain ontology from security requirements in regulatory documents," in SESS '06: Proceedings of the 2006 international workshop on Software engineering for secure systems. New York, NY, USA: ACM, 2006, pp. 43-50.
-
(2006)
SESS '06: Proceedings of the 2006 International Workshop on Software Engineering for Secure Systems
, pp. 43-50
-
-
Lee, S.-W.1
Gandhi, R.2
Muthurajan, D.3
Yavagal, D.4
Ahn, G.-J.5
-
12
-
-
84924413055
-
Security and trust requirements engineering
-
P. Giorgini, F. Massacci, and N. Zannone, "Security and trust requirements engineering," in Foundations of Security Analysis and Design III, 2005, pp. 237- 272.
-
(2005)
Foundations of Security Analysis and Design III
, pp. 237-272
-
-
Giorgini, P.1
Massacci, F.2
Zannone, N.3
-
13
-
-
4544255381
-
Elaborating security requirements by construction of intentional anti-models
-
A. van Lamsweerde, "Elaborating security requirements by construction of intentional anti-models," in ICSE '04: Proceedings of the 26th International Conference on Software Engineering, Washington, DC, USA, 2004, pp. 148-157.
-
(2004)
ICSE '04: Proceedings of the 26th International Conference on Software Engineering, Washington, DC, USA
, pp. 148-157
-
-
Van Lamsweerde, A.1
-
14
-
-
80455177412
-
Security requirements engineering for evolving software systems: A survey
-
A. Nhlabatsi, B. Nuseibeh, and Y. Yu, "Security requirements engineering for evolving software systems: A survey," Journal of Secure Software Engineering, vol. 1, pp. 54-73, 2009.
-
(2009)
Journal of Secure Software Engineering
, vol.1
, pp. 54-73
-
-
Nhlabatsi, A.1
Nuseibeh, B.2
Yu, Y.3
-
15
-
-
84974691155
-
Reasoning with goal models
-
P. Giorgini, J. Mylopoulos, E. Nicchiarelli, and R. Sebastiani, "Reasoning with goal models," in Conceptual Modeling ER 2002, 2003, pp. 167-181.
-
(2002)
Conceptual Modeling ER
, pp. 167-181
-
-
Giorgini, P.1
Mylopoulos, J.2
Nicchiarelli, E.3
Sebastiani, R.4
-
16
-
-
0012168491
-
Software change impact analysis
-
R. S. Arnold, "Software change impact analysis," Computer, 1996.
-
(1996)
Computer
-
-
Arnold, R.S.1
-
17
-
-
0033163707
-
An empirical approach to studying software evolution
-
C. F. Kemerer and S. Slaughter, "An empirical approach to studying software evolution," IEEE Trans. Softw. Eng., vol. 25, pp. 493-509, 1999.
-
(1999)
IEEE Trans. Softw. Eng.
, vol.25
, pp. 493-509
-
-
Kemerer, C.F.1
Slaughter, S.2
-
18
-
-
0037341520
-
Locating features in source code
-
T. Eisenbarth, R. Koschke, and D. Simon, "Locating features in source code," IEEE Trans. Softw. Eng., vol. 29, pp. 210-224, 2003.
-
(2003)
IEEE Trans. Softw. Eng.
, vol.29
, pp. 210-224
-
-
Eisenbarth, T.1
Koschke, R.2
Simon, D.3
-
19
-
-
0032083407
-
Version models for software configuration management
-
R. Conradi and B. Westfechtel, "Version models for software configuration management," ACM Comput. Surv., vol. 30, pp. 232-282, 1998.
-
(1998)
ACM Comput. Surv.
, vol.30
, pp. 232-282
-
-
Conradi, R.1
Westfechtel, B.2
-
20
-
-
0032665183
-
An architecture- Based approach to self-adaptive software
-
Medvidovic, A. Quilici, D. S. Rosenblum, and A. L. Wolf, "An architecture- based approach to self-adaptive software," IEEE Intelligent Systems, vol. 14, pp. 54-62, 1999.
-
(1999)
IEEE Intelligent Systems
, vol.14
, pp. 54-62
-
-
Medvidovic, A.Q.1
Rosenblum, D.S.2
Wolf, A.L.3
-
21
-
-
4644274050
-
Predicting source code changes by mining change history
-
A. T. T. Ying, G. C. Murphy, R. Ng, and M. C. Chu-Carroll, "Predicting source code changes by mining change history," IEEE Trans. Softw. Eng., vol. 30, pp. 574-586, 2004.
-
(2004)
IEEE Trans. Softw. Eng.
, vol.30
, pp. 574-586
-
-
Ying, A.T.T.1
Murphy, G.C.2
Ng, R.3
Chu-Carroll, M.C.4
-
23
-
-
0030085657
-
Software change management
-
C. Jones, "Software change management," Computer, vol. 29, pp. 80-82, 1996.
-
(1996)
Computer
, vol.29
, pp. 80-82
-
-
Jones, C.1
-
26
-
-
0000232248
-
Logical models of argument
-
C. I. Chesnevar, A. G. Maguitman, and R. P. Loui, "Logical models of argument," ACM Comput. Surv., vol. 32, pp. 337-383, 2000.
-
(2000)
ACM Comput. Surv.
, vol.32
, pp. 337-383
-
-
Chesnevar, C.I.1
Maguitman, A.G.2
Loui, R.P.3
-
27
-
-
7544237999
-
Argumentation semantics for defeasible logic
-
G. Governatori, M. J. Maher, G. Antoniou, and D. Billington, "Argumentation semantics for defeasible logic," J Logic Computation, vol. 14, pp. 675-702, 2004.
-
(2004)
J Logic Computation
, vol.14
, pp. 675-702
-
-
Governatori, G.1
Maher, M.J.2
Antoniou, G.3
Billington, D.4
-
28
-
-
73549118134
-
Analysis of multiparty agreement in requirements validation
-
I. Jureta, J. Mylopoulos, and S. Faulkner, "Analysis of multiparty agreement in requirements validation," in 17th IEEE International Requirements Engineering Conference (RE'09), Atlanta, GA, USA, 2009,, 2009, pp. 57-66.
-
(2009)
17th IEEE International Requirements Engineering Conference (RE'09), Atlanta, GA, USA, 2009
, pp. 57-66
-
-
Jureta, I.1
Mylopoulos, J.2
Faulkner, S.3
-
29
-
-
38349018590
-
Extending argumentation to goal-oriented requirements engineering
-
I. Habli, W. Wu, K. Attwood, and T. Kelly, "Extending argumentation to goal-oriented requirements engineering," in Advances in Conceptual Modeling Foundations and Applications, 2007, pp. 306-316.
-
(2007)
Advances in Conceptual Modeling Foundations and Applications
, pp. 306-316
-
-
Habli, I.1
Wu, W.2
Attwood, K.3
Kelly, T.4
-
30
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
C. B. Haley, R. C. Laney, J. D. Moffett, and B. Nuseibeh, "Security requirements engineering: A framework for representation and analysis," IEEE Trans. Software Eng., vol. 34, pp. 133-153, 2008.
-
(2008)
IEEE Trans. Software Eng.
, vol.34
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
31
-
-
0022605949
-
A logic-based calculus of events
-
R. Kowalski and M. Sergot, "A logic-based calculus of events," New Gen. Comput., vol. 4, no. 1, pp. 67-95, 1986.
-
(1986)
New Gen. Comput.
, vol.4
, Issue.1
, pp. 67-95
-
-
Kowalski, R.1
Sergot, M.2
-
34
-
-
0003633770
-
-
papers by John McCarthy edited by V. Lifschitz. Ablex
-
J. McCarthy, Formalization of common sense, papers by John McCarthy edited by V. Lifschitz. Ablex, 1990.
-
(1990)
Formalization of Common Sense
-
-
McCarthy, J.1
-
35
-
-
0020910824
-
What good is temporal logic?
-
L. Lamport, "What good is temporal logic?" in IFIP Congress, 1983, pp. 657-668.
-
IFIP Congress, 1983
, pp. 657-668
-
-
Lamport, L.1
-
36
-
-
0031221255
-
Stutter-invariant temporal properties are expressible without the next-time operator
-
D. Peled and T. Wilke, "Stutter-invariant temporal properties are expressible without the next-time operator," Inf. Process. Lett., vol. 63, no. 5, pp. 243-246, 1997.
-
(1997)
Inf. Process. Lett.
, vol.63
, Issue.5
, pp. 243-246
-
-
Peled, D.1
Wilke, T.2
|