메뉴 건너뛰기




Volumn 2773 PART 1, Issue , 2003, Pages 1387-1394

An ontology for modelling security: The tropos approach

Author keywords

[No Author keywords available]

Indexed keywords

CONSTRAINT THEORY; GRAPH THEORY; MATHEMATICAL MODELS; PROFESSIONAL ASPECTS; SOCIAL ASPECTS; SOFTWARE ENGINEERING; ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 8344270973     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-45224-9_187     Document Type: Conference Paper
Times cited : (37)

References (10)
  • 1
    • 0001042167 scopus 로고    scopus 로고
    • A survey of agent-oriented methodologies
    • A. S. Rao, J. P. Muller, M. P. Singh (eds), Lecture Notes in Computer Science, Springer-Verlag
    • C. Iglesias, M. Garijo, J. Gonzales, "A survey of agent-oriented methodologies", Intelligent Agents IV, A. S. Rao, J. P. Muller, M. P. Singh (eds), Lecture Notes in Computer Science, Springer-Verlag, 1999
    • (1999) Intelligent Agents IV
    • Iglesias, C.1    Garijo, M.2    Gonzales, J.3
  • 9
    • 8344273713 scopus 로고    scopus 로고
    • Extending tropos methodology to accommodate security
    • Computer Science Department, University of Sheffield, October
    • H. Mouratidis, "Extending Tropos Methodology to Accommodate Security". Progress Report, Computer Science Department, University of Sheffield, October 2002
    • (2002) Progress Report
    • Mouratidis, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.