-
1
-
-
2942713443
-
Security use cases
-
D. G. Firesmith, "Security Use Cases," Journal of Object Technology, vol. 2, no. 3, pp. 53-64, 2003. (Pubitemid 38809349)
-
(2003)
Journal of Object Technology
, vol.2
, Issue.3
, pp. 53-64
-
-
Firesmith, D.G.1
-
2
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
IEEE Computer Society
-
L. Liu, E. Yu, and J. Mylopoulos, "Security and Privacy Requirements Analysis within a Social Setting," in Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003). IEEE Computer Society, 2003, pp. 151-161.
-
(2003)
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003)
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
3
-
-
0142156745
-
Requirement engineering meets security: A case study on modelling secure electronic transactions by VISA and mastercard
-
ser. LNCS Springer
-
P. Giorgini, F. Massacci, and J. Mylopoulos, "Requirement Engineering meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard," in Proceedings of the 22nd International Conference on Conceptual Modeling (ER 2003), ser. LNCS, vol. 2813. Springer, 2003, pp. 263-276.
-
(2003)
Proceedings of the 22nd International Conference on Conceptual Modeling (ER 2003)
, vol.2813
, pp. 263-276
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
-
4
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
DOI 10.1109/TSE.2007.70754
-
C. Haley, R. Laney, J. Moffett, and B. Nuseibeh, "Security Requirements Engineering: A Framework for Representation and Analysis," IEEE Transactions on Software Engineering, vol. 34, no. 1, pp. 133-153, 2008. (Pubitemid 351343906)
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.2
Moffett, J.D.3
Nuseibeh, B.4
-
6
-
-
0032675444
-
An ontology for commitments in multiagent systems: Toward a unification of normative concepts
-
M. P. Singh, "An Ontology for Commitments in Multiagent Systems: Toward a Unification of Normative Concepts," Artificial Intelligence and Law, vol. 7, no. 1, pp. 97-113, 1999.
-
(1999)
Artificial Intelligence and Law
, vol.7
, Issue.1
, pp. 97-113
-
-
Singh, M.P.1
-
7
-
-
78649919846
-
Modeling and reasoning about service-oriented applications via goals and commitments
-
Springer
-
A. K. Chopra, F. Dalpiaz, P. Giorgini, and J. Mylopoulos, "Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments," in Proceedings of 22nd International Conference on Advanced Information Systems Engineering (CAiSE'10), ser. LNCS, vol. 6051. Springer, 2010, pp. 113-128.
-
(2010)
Proceedings of 22nd International Conference on Advanced Information Systems Engineering (CAiSE'10), Ser. LNCS
, vol.6051
, pp. 113-128
-
-
Chopra, A.K.1
Dalpiaz, F.2
Giorgini, P.3
Mylopoulos, J.4
-
9
-
-
77950521027
-
Guest editorial: Security requirements engineering: Past, present and future
-
E. Dubois and H. Mouratidis, "Guest Editorial: Security Requirements Engineering: Past, Present and Future," Requirements Engineering, vol. 15, no. 1, pp. 1-5, 2010.
-
(2010)
Requirements Engineering
, vol.15
, Issue.1
, pp. 1-5
-
-
Dubois, E.1
Mouratidis, H.2
-
10
-
-
27644537252
-
Modeling Security Requirements through ownership, permission and delegation
-
Proceedings - 13th IEEE International Conference on Requirements Engineering, RE 2005
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, "Modeling Security Requirements through Ownership, Permission and Delegation," in Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005). IEEE Computer Society, 2005, pp. 167-176. (Pubitemid 41563787)
-
(2005)
Proceedings of the IEEE International Conference on Requirements Engineering
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
11
-
-
34249004734
-
Secure Tropos: A security-oriented extension of the Tropos methodology
-
DOI 10.1142/S0218194007003240, PII S0218194007003240
-
H. Mouratidis and P. Giorgini, "Secure Tropos: A Security-Oriented Extension of the Tropos methodology," International Journal of Software Engineering and Knowledge Engineering, vol. 17, no. 2, pp. 285-309, 2007. (Pubitemid 46782074)
-
(2007)
International Journal of Software Engineering and Knowledge Engineering
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
13
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre and A. L. Opdahl, "Eliciting Security Requirements with Misuse Cases," Requirements Engineering, vol. 10, no. 1, pp. 34-44, 2005.
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
14
-
-
38349123642
-
A goal oriented approach for modeling and analyzing security trade-offs
-
ser. LNCS
-
G. Elahi and E. Yu, "A Goal Oriented Approach for Modeling and Analyzing Security Trade-offs," in Proceedings of the 26th International Conference on Conceptual modeling (ER 2007), ser. LNCS, vol. 4801, 2007, pp. 375-390.
-
(2007)
Proceedings of the 26th International Conference on Conceptual Modeling (ER 2007)
, vol.4801
, pp. 375-390
-
-
Elahi, G.1
Yu, E.2
-
15
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
DOI 10.1109/TSE.2007.70746
-
T. D. Breaux and A. I. Antón, "Analyzing Regulatory Rules for Privacy and Security Requirements," IEEE Transactions on Software Engineering, vol. 34, no. 1, pp. 5-20, 2008. (Pubitemid 351343899)
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.D.1
Anton, A.I.2
-
16
-
-
84974691155
-
Reasoning with goal models
-
P. Giorgini, J. Mylopoulos, and R. Nicchiarelli, Eleonora and Sebastiani, "Reasoning with Goal Models," in Proceedings of the 21st International Conference on Conceptual Modeling (ER 2002), 2002, pp. 167-181.
-
(2002)
Proceedings of the 21st International Conference on Conceptual Modeling (ER 2002)
, pp. 167-181
-
-
Giorgini, P.1
Mylopoulos, J.2
Nicchiarelli, R.3
Eleonora4
Sebastiani5
|