메뉴 건너뛰기




Volumn 734, Issue , 2011, Pages 89-96

SecTro: A CASE tool for modelling security in requirements engineering using Secure Tropos

Author keywords

CASE tools; Goal modelling; Requirements engineering; Secure Tropos; Security

Indexed keywords

APPROPRIATE MODELS; DEVELOPMENT PROCESS; GOAL MODELLING; SECURE TROPOS; SECURITY; SECURITY CONSTRAINT;

EID: 84890729922     PISSN: 16130073     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (15)
  • 1
    • 34249004734 scopus 로고    scopus 로고
    • Secure Tropos: A security-oriented extension of the Tropos methodology
    • DOI 10.1142/S0218194007003240, PII S0218194007003240
    • Mouratidis, H., Giorgini, P.: Secure Tropos: A Security-Oriented Extension of the Tropos Methodology. International Journal of Software Engineering and Knowledge Engineering 17(2), pp. 285-309 (2007) (Pubitemid 46782074)
    • (2007) International Journal of Software Engineering and Knowledge Engineering , vol.17 , Issue.2 , pp. 285-309
    • Mouratidis, H.1    Giorgini, P.2
  • 2
    • 38349060508 scopus 로고    scopus 로고
    • Integrating security and software engineering: Future vision and challenges
    • Mouratidis, H., Giorgini, P. (eds.). Idea Group Publishing, London
    • Mouratidis, H., Giorgini, P.: Integrating Security and Software Engineering: Future Vision and Challenges. In: Mouratidis, H., Giorgini, P. (eds.) Integrating Security and Software Engineering: Advances and Future Visions. Idea Group Publishing, London (2007)
    • (2007) Integrating Security and Software Engineering: Advances and Future Visions
    • Mouratidis, H.1    Giorgini, P.2
  • 5
    • 34548508691 scopus 로고    scopus 로고
    • Security Attack Testing (SAT)-testing the security of information systems at design time
    • DOI 10.1016/j.is.2007.03.002, PII S0306437907000117
    • Mouratidis, H., Giorgini, P.: Security Attack Testing (SAT) - Testing the Security of Information Systems at Design Time. Journal of Information Systems 32, pp. 1166-1183 (2007) (Pubitemid 47379495)
    • (2007) Information Systems , vol.32 , Issue.8 , pp. 1166-1183
    • Mouratidis, H.1    Giorgini, P.2
  • 6
    • 84890776775 scopus 로고    scopus 로고
    • OME3, http://www.cs.toronto.edu/km/ome/
  • 7
    • 84890650627 scopus 로고    scopus 로고
    • OpenOME, https://se.cs.toronto.edu/trac/ome/
    • OpenOME
  • 10
    • 13844255590 scopus 로고    scopus 로고
    • Goal-oriented requirements analysis and reasoning in the Tropos methodology
    • DOI 10.1016/j.engappai.2004.11.017, PII S0952197604001885, Agent-Oriented Software Development
    • Giorgini, P., Mylopoulos, J., Sebastiani, R.: Goal-Oriented Requirements Analysis and Reasoning in Tropos Methodology. Journal of Engineering Applications of Artificial Intelligence 18(2), pp. 159-171 (2005) (Pubitemid 40245086)
    • (2005) Engineering Applications of Artificial Intelligence , vol.18 , Issue.2 , pp. 159-171
    • Giorgini, P.1    Mylopoulos, J.2    Sebastiani, R.3
  • 11
    • 34548563765 scopus 로고    scopus 로고
    • Computer-aided support for secure tropos
    • DOI 10.1007/s10515-007-0013-5
    • Massaci, F., Mylopoulos, J., Zanone, N.: Computer-Aided Support for Secure Tropos. Journal of Automated Software Engineering 14(2), 341-364 (2007) (Pubitemid 47397543)
    • (2007) Automated Software Engineering , vol.14 , Issue.3 , pp. 341-364
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 13
    • 50249156344 scopus 로고    scopus 로고
    • Assessing the applicability of use case maps for business process and workflow description
    • Montreal
    • Mussbacher, G., Amyot, D.: Assessing the Applicability of Use Case Maps for Business Process and Workflow Description. In: 2008 International MCETECH Conference on e-Technologies, pp. 219-222. Montreal (2008)
    • (2008) 2008 International MCETECH Conference on E-Technologies , pp. 219-222
    • Mussbacher, G.1    Amyot, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.