-
3
-
-
3142750497
-
Tropos: An agent-oriented software development methodology
-
Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., & Mylopoulos, J. (2004). Tropos: An agent-oriented software development methodology. Autonomous Agents and Multi-Agent Systems, 8(3), 203-236. doi:10.1023/B:AGNT.0000018806.20944.ef
-
(2004)
Autonomous Agents and Multi-agent Systems
, vol.8
, Issue.3
, pp. 203-236
-
-
Bresciani, P.1
Perini, A.2
Giorgini, P.3
Giunchiglia, F.4
Mylopoulos, J.5
-
5
-
-
84865006235
-
Incorporating social trust into design practices for secure systems
-
H. Mouratidis Ed., IGI Global
-
Cofta, P., Lacohee, H., & Hodgson, P. (2011). Incorporating social trust into design practices for secure systems. In H. Mouratidis (Ed.), Software engineering for secure systems: Industrial and research perspectives (pp. 260-284). IGI Global.
-
(2011)
Software Engineering for Secure Systems: Industrial and Research Perspectives
, pp. 260-284
-
-
Cofta, P.1
Lacohee, H.2
Hodgson, P.3
-
6
-
-
84984730831
-
From technical to socio-technical change: Tackling the human and organizational aspects of systems development projects
-
Doherty, F. N., & King, M. (2005). From technical to socio-technical change: Tackling the human and organizational aspects of systems development projects. European Journal of Information Systems, 14, 1-5. doi:10.1057/palgrave.ejis.3000517
-
(2005)
European Journal of Information Systems
, vol.14
, pp. 1-5
-
-
Doherty, F.N.1
King, M.2
-
7
-
-
33749035450
-
Requirements engineering for trust management
-
Giorgini, P., Massaci, F., Mylopoulos, J., & Zanone, N. (2004). Requirements engineering for trust management. International Journal of Information Security, 5(4), 257-274. doi:10.1007/s10207-006-0005-7
-
(2004)
International Journal of Information Security
, vol.5
, Issue.4
, pp. 257-274
-
-
Giorgini, P.1
Massaci, F.2
Mylopoulos, J.3
Zanone, N.4
-
8
-
-
77950516884
-
Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec
-
Houmb, S. H., Islam, S., Knauss, E., Jürjens, J., & Schneider, K. (2010). Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec. Requirements Engineering Journal, 15(1), 63-93. doi:10.1007/s00766-009-0093-9
-
(2010)
Requirements Engineering Journal
, vol.15
, Issue.1
, pp. 63-93
-
-
Houmb, S.H.1
Islam, S.2
Knauss, E.3
Jürjens, J.4
Schneider, K.5
-
10
-
-
79959729769
-
A framework to support alignment of secure software engineering with legal regulations
-
Islam, S., Mouratidis, H., & Jürjens, J. (2011). A framework to support alignment of secure software engineering with legal regulations. Journal of Software and Systems Modeling (SoSyM) [NFPinDSML]. Theme Section on Non-Functional System Properties in Domain-Specific Modeling Languages, 10(3), 369-394.
-
(2011)
Journal of Software and Systems Modeling (SoSyM) [NFPinDSML]. Theme Section on Non-functional System Properties in Domain-Specific Modeling Languages
, vol.10
, Issue.3
, pp. 369-394
-
-
Islam, S.1
Mouratidis, H.2
Jürjens, J.3
-
11
-
-
77955462130
-
Towards a framework to elicit and manage security and privacy requirements from laws and regulations
-
Essen, Germany: Springer-Verlag
-
Islam, S., Mouratidis, H., & Wagner, S. (2010b). Towards a framework to elicit and manage security and privacy requirements from laws and regulations. In Proceedings of 16th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ'10). Essen, Germany: Springer-Verlag.
-
(2010)
Proceedings of 16th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ'10)
-
-
Islam, S.1
Mouratidis, H.2
Wagner, S.3
-
12
-
-
24944524211
-
Can we manage trust?
-
Paris, France
-
Josang, A., Keser, C., & Dimitrakos, T. (2005). Can we manage trust? In Proceedings of the 3rd International Conference of Trust Management (iTrust), Paris, France (pp. 93-107).
-
(2005)
Proceedings of the 3rd International Conference of Trust Management (iTrust)
, pp. 93-107
-
-
Josang, A.1
Keser, C.2
Dimitrakos, T.3
-
13
-
-
70349672788
-
Holistic trust design of e-services
-
R. Song, L. Korba, & G. Yee Eds., IGI Global
-
Lo Presti, S., Butler, M., Leushel, M., & Booth, C. (2006). Holistic trust design of e-services. In R. Song, L. Korba, & G. Yee (Eds.), Trust in e-services: Technologies, practices and challenges (pp. 113-139). IGI Global.
-
(2006)
Trust in E-services: Technologies, Practices and Challenges
, pp. 113-139
-
-
Lo Presti, S.1
Butler, M.2
Leushel, M.3
Booth, C.4
-
14
-
-
0003487794
-
-
Stanford University Press
-
Luhmann, N. (1995). Social systems. Stanford University Press.
-
(1995)
Social Systems
-
-
Luhmann, N.1
-
15
-
-
24144503351
-
The trust/control duality: An integrative perspective on positive expectations of others
-
Mollering, G. (2005). The trust/control duality: An integrative perspective on positive expectations of others. International Sociology, 20(3), 283-305. doi:10.1177/0268580905055478
-
(2005)
International Sociology
, vol.20
, Issue.3
, pp. 283-305
-
-
Mollering, G.1
-
16
-
-
34249004734
-
Secure tropos: A security-oriented extension of the tropos methodology
-
Mouratidis, H., & Giorgini, P. (2007). Secure tropos: A security-oriented extension of the tropos methodology. International Journal of Software Engineering and Knowledge Engineering, 17(2), 285-309. doi:10.1142/S0218194007003240
-
(2007)
International Journal of Software Engineering and Knowledge Engineering
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
17
-
-
84920140596
-
-
Retrieved March, 2, 2012
-
OMG. (2008). SPEM 2.0. Retrieved March 2, 2012, from http://www.omg.org/spec/SPEM/2.0
-
(2008)
SPEM 2.0
-
-
OMG1
-
18
-
-
84879876797
-
Modelling security using trust based concepts
-
Pavlidis, M., Mouratidis, H., & Islam, S. (2012a). Modelling security using trust based concepts. International Journal of Secure Software Engineering (IJSSE). Special Issue on Security Modelling, 3(2), 36-53.
-
(2012)
International Journal of Secure Software Engineering (IJSSE). Special Issue on Security Modelling
, vol.3
, Issue.2
, pp. 36-53
-
-
Pavlidis, M.1
Mouratidis, H.2
Islam, S.3
-
19
-
-
84864974880
-
Dealing with trust and control: A meta-model for trustworthy information systems development
-
Valencia, Spain
-
Pavlidis, M., Mouratidis, H., & Islam, S. (2012b). Dealing with trust and control: A meta-model for trustworthy information systems development. In Proceedings of the Sixth IEEE International Conference on Research Challenges in Information Science, Valencia, Spain.
-
(2012)
Proceedings of the Sixth IEEE International Conference on Research Challenges in Information Science
-
-
Pavlidis, M.1
Mouratidis, H.2
Islam, S.3
-
21
-
-
18444400881
-
Information systems development as emergent socio-technical change: A practice approach
-
Reyes-Luna, F. L., Zhang, J., Gil-Garcia, R. J., & Cresswell, M. A. (2005). Information systems development as emergent socio-technical change: a practice approach. European Journal of Information Systems, 14, 93-105. doi:10.1057/palgrave. ejis.3000524
-
(2005)
European Journal of Information Systems
, vol.14
, pp. 93-105
-
-
Reyes-Luna, F.L.1
Zhang, J.2
Gil-Garcia, R.J.3
Cresswell, M.A.4
-
26
-
-
84899311212
-
A social ontology for integrating security and software engineering
-
H. Mouratidis, & P. Giorgini Eds., IGI Global
-
Yu, E., Liu, L., & Mylopoulos, J. (2007). A social ontology for integrating security and software engineering. In H. Mouratidis, & P. Giorgini (Eds.), Integrating security and software engineering: Advances and future visions (pp. 70-105). IGI Global. doi:10.4018/978-1-59904-937-3.ch163
-
(2007)
Integrating Security and Software Engineering: Advances and Future Visions
, pp. 70-105
-
-
Yu, E.1
Liu, L.2
Mylopoulos, J.3
-
27
-
-
84864670823
-
A meta-model for legal compliance and trustworthiness of information systems
-
Gdask, Poland, Springer Lecture Notes in Business Information Processing LNBIP
-
Zarrabi, F., Pavlidis, M., Mouratidis, H., Islam, S., & Preston, D. (2012). A meta-model for legal compliance and trustworthiness of information systems. In Proceedings of the 2nd International Workshop on Information Systems Security Engineering (WISSE 2012) (in Conjunction with CAiSE 2012), Gdask, Poland (pp. 46-60). Springer Lecture Notes in Business Information Processing (LNBIP).
-
(2012)
Proceedings of the 2nd International Workshop on Information Systems Security Engineering (WISSE 2012) (in Conjunction with CAiSE 2012)
, pp. 46-60
-
-
Zarrabi, F.1
Pavlidis, M.2
Mouratidis, H.3
Islam, S.4
Preston, D.5
|