-
1
-
-
84868327624
-
Security requirements engineering via commitments
-
F. Dalpiaz, E. Paja, and P. Giorgini, "Security requirements engineering via commitments, " in Proceedings of the First Workshop on Socio-Technical Aspects in Security and Trust (STAST'11), 2011, pp. 1-8.
-
(2011)
Proceedings of the First Workshop on Socio-Technical Aspects in Security and Trust (STAST'11)
, pp. 1-8
-
-
Dalpiaz, F.1
Paja, E.2
Giorgini, P.3
-
2
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
L. Liu, E. Yu, and J. Mylopoulos, "Security and Privacy Requirements Analysis within a Social Setting, " in Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003). IEEE Computer Society, 2003, pp. 151-161.
-
(2003)
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003). IEEE Computer Society
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
3
-
-
27644537252
-
Modeling security requirements through ownership, permission and delegation
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, "Modeling Security Requirements through Ownership, Permission and Delegation, " in Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005). IEEE Computer Society, 2005, pp. 167-176.
-
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005). IEEE Computer Society
, vol.2005
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
4
-
-
0032675444
-
An ontology for commitments in multiagent systems: Toward a unification of normative concepts
-
M. P. Singh, "An Ontology for Commitments in Multiagent Systems: Toward a Unification of Normative Concepts, " Artificial Intelligence and Law, vol. 7, pp. 97-113, 1999.
-
(1999)
Artificial Intelligence and Law
, vol.7
, pp. 97-113
-
-
Singh, M.P.1
-
5
-
-
3142750497
-
Tropos: An agent-oriented software development methodology
-
P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, and J. Mylopoulos, "Tropos: An Agent-Oriented Software Development Methodology, " Autonomous Agents and Multi-Agent Systems, vol. 8, no. 3, pp. 203-236, 2004.
-
(2004)
Autonomous Agents and Multi-Agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Perini, A.2
Giorgini, P.3
Giunchiglia, F.4
Mylopoulos, J.5
-
6
-
-
84870674699
-
Formative user-centered evaluation of security modeling: Results from a case study
-
S. Trösterer, E. Beck, F. Dalpiaz, E. Paja, P. Giorgini, and M. Tscheligi, "Formative User-Centered Evaluation of Security Modeling: Results from a Case Study, " International Journal of Secure Software Engineering, vol. 3, no. 1, pp. 1-19, 2012.
-
(2012)
International Journal of Secure Software Engineering
, vol.3
, Issue.1
, pp. 1-19
-
-
Trösterer, S.1
Beck, E.2
Dalpiaz, F.3
Paja, E.4
Giorgini, P.5
Tscheligi, M.6
|