메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1-8

Security requirements engineering via commitments

Author keywords

Commitments; Goal models; Security requirements

Indexed keywords

COMMITMENTS; GOAL MODELS; GOAL-ORIENTED MODELLING; ORGANISATIONAL; SECURITY REQUIREMENTS; SECURITY REQUIREMENTS ENGINEERING; SOCIAL COMMITMENT; TECHNICAL SECURITY;

EID: 84868327624     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/STAST.2011.6059249     Document Type: Conference Paper
Times cited : (38)

References (17)
  • 1
    • 2942713443 scopus 로고    scopus 로고
    • Security use cases
    • D. G. Firesmith, "Security Use Cases," Journal of Object Technology, vol. 2, no. 3, pp. 53-64, 2003. (Pubitemid 38809349)
    • (2003) Journal of Object Technology , vol.2 , Issue.3 , pp. 53-64
    • Firesmith, D.G.1
  • 3
    • 0142156745 scopus 로고    scopus 로고
    • Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and mastercard
    • ser. LNCS Springer
    • P. Giorgini, F. Massacci, and J. Mylopoulos, "Requirement Engineering meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard," in Proceedings of the 22nd International Conference on Conceptual Modeling (ER 2003), ser. LNCS, vol. 2813. Springer, 2003, pp. 263-276.
    • (2003) Proceedings of the 22nd International Conference on Conceptual Modeling (ER 2003) , vol.2813 , pp. 263-276
    • Giorgini, P.1    Massacci, F.2    Mylopoulos, J.3
  • 4
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • DOI 10.1109/TSE.2007.70754
    • C. Haley, R. Laney, J. Moffett, and B. Nuseibeh, "Security Requirements Engineering: A Framework for Representation and Analysis," IEEE Transactions on Software Engineering, vol. 34, no. 1, pp. 133-153, 2008. (Pubitemid 351343906)
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.B.1    Laney, R.2    Moffett, J.D.3    Nuseibeh, B.4
  • 6
    • 0032675444 scopus 로고    scopus 로고
    • An ontology for commitments in multiagent systems: Toward a unification of normative concepts
    • M. P. Singh, "An Ontology for Commitments in Multiagent Systems: Toward a Unification of Normative Concepts," Artificial Intelligence and Law, vol. 7, no. 1, pp. 97-113, 1999.
    • (1999) Artificial Intelligence and Law , vol.7 , Issue.1 , pp. 97-113
    • Singh, M.P.1
  • 9
    • 77950521027 scopus 로고    scopus 로고
    • Guest editorial: Security requirements engineering: Past, present and future
    • E. Dubois and H. Mouratidis, "Guest Editorial: Security Requirements Engineering: Past, Present and Future," Requirements Engineering, vol. 15, no. 1, pp. 1-5, 2010.
    • (2010) Requirements Engineering , vol.15 , Issue.1 , pp. 1-5
    • Dubois, E.1    Mouratidis, H.2
  • 11
    • 34249004734 scopus 로고    scopus 로고
    • Secure Tropos: A security-oriented extension of the Tropos methodology
    • DOI 10.1142/S0218194007003240, PII S0218194007003240
    • H. Mouratidis and P. Giorgini, "Secure Tropos: A Security-Oriented Extension of the Tropos methodology," International Journal of Software Engineering and Knowledge Engineering, vol. 17, no. 2, pp. 285-309, 2007. (Pubitemid 46782074)
    • (2007) International Journal of Software Engineering and Knowledge Engineering , vol.17 , Issue.2 , pp. 285-309
    • Mouratidis, H.1    Giorgini, P.2
  • 13
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre and A. L. Opdahl, "Eliciting Security Requirements with Misuse Cases," Requirements Engineering, vol. 10, no. 1, pp. 34-44, 2005.
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 15
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • DOI 10.1109/TSE.2007.70746
    • T. D. Breaux and A. I. Antón, "Analyzing Regulatory Rules for Privacy and Security Requirements," IEEE Transactions on Software Engineering, vol. 34, no. 1, pp. 5-20, 2008. (Pubitemid 351343899)
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.D.1    Anton, A.I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.