-
1
-
-
0040884892
-
A flexible authorization mechanism for relational data management systems
-
Bertino, E., Jajodia, S., Samarati, P.: A flexible authorization mechanism for relational data management systems. ACM Transactions on Information Systems 17(2), 101-140 (1999)
-
(1999)
ACM Transactions on Information Systems
, vol.17
, Issue.2
, pp. 101-140
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
2
-
-
84868327624
-
Security requirements engineering via commitments
-
Dalpiaz, F., Paja, E., Giorgini, P.: Security requirements engineering via commitments. In: Proc. of STAST 2011, pp. 1-8 (2011)
-
(2011)
Proc. of STAST 2011
, pp. 1-8
-
-
Dalpiaz, F.1
Paja, E.2
Giorgini, P.3
-
3
-
-
32344449269
-
Reasoning about confidentiality at requirements engineering time
-
De Landtsheer, R., van Lamsweerde, A.: Reasoning about confidentiality at requirements engineering time. In: Proc. of FSE 2005, pp. 41-49 (2005)
-
(2005)
Proc. of FSE 2005
, pp. 41-49
-
-
De Landtsheer, R.1
Van Lamsweerde, A.2
-
4
-
-
38349123642
-
A goal oriented approach for modeling and analyzing security trade-offs
-
Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. Springer, Heidelberg
-
Elahi, G., Yu, E.: A goal oriented approach for modeling and analyzing security trade-offs. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol. 4801, pp. 375-390. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4801
, pp. 375-390
-
-
Elahi, G.1
Yu, E.2
-
5
-
-
0028481195
-
Inconsistency handling in multiperspective specifications
-
Finkelstein, A., Gabbay, D., Hunter, A., Kramer, J., Nuseibeh, B.: Inconsistency handling in multiperspective specifications. IEEE TSE 20(8), 569-578 (1994)
-
(1994)
IEEE TSE
, vol.20
, Issue.8
, pp. 569-578
-
-
Finkelstein, A.1
Gabbay, D.2
Hunter, A.3
Kramer, J.4
Nuseibeh, B.5
-
6
-
-
0034829384
-
Model checking early requirements specifications in tropos
-
Fuxman, A., Pistore, M., Mylopoulos, J., Traverso, P.: Model checking early requirements specifications in tropos. In: Proc. of RE 2001, pp. 174-181 (2001)
-
(2001)
Proc. of RE 2001
, pp. 174-181
-
-
Fuxman, A.1
Pistore, M.2
Mylopoulos, J.3
Traverso, P.4
-
7
-
-
27644537252
-
Modeling security requirements through ownership, permission and delegation
-
Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling security requirements through ownership, permission and delegation. In: Proc. of RE 2005, pp. 167-176 (2005)
-
(2005)
Proc. of RE 2005
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
8
-
-
84974691155
-
Reasoning with goal models
-
Spaccapietra, S., March, S.T., Kambayashi, Y. (eds.) ER 2002. Springer, Heidelberg
-
Giorgini, P., Mylopoulos, J., Nicchiarelli, E., Sebastiani, R.: Reasoning with goal models. In: Spaccapietra, S., March, S.T., Kambayashi, Y. (eds.) ER 2002. LNCS, vol. 2503, pp. 167-181. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2503
, pp. 167-181
-
-
Giorgini, P.1
Mylopoulos, J.2
Nicchiarelli, E.3
Sebastiani, R.4
-
9
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Security requirements engineering: A framework for representation and analysis. IEEE TSE 34(1), 133-153 (2008)
-
(2008)
IEEE TSE
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.2
Moffett, J.D.3
Nuseibeh, B.4
-
10
-
-
78649919643
-
Finding solutions in goal models: An interactive backward reasoning approach
-
Parsons, J., Saeki, M., Shoval, P., Woo, C., Wand, Y. (eds.) ER 2010. Springer, Heidelberg
-
Horkoff, J., Yu, E.: Finding solutions in goal models: An interactive backward reasoning approach. In: Parsons, J., Saeki, M., Shoval, P., Woo, C., Wand, Y. (eds.) ER 2010. LNCS, vol. 6412, pp. 59-75. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6412
, pp. 59-75
-
-
Horkoff, J.1
Yu, E.2
-
12
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: Proc. of RE 2003, pp. 151-161 (2003)
-
(2003)
Proc. of RE 2003
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
13
-
-
34249004734
-
Secure Tropos: A security-oriented extension of the tropos methodology
-
Mouratidis, H., Giorgini, P.: Secure Tropos: A security-oriented extension of the tropos methodology. IJSEKE 17(2), 285-309 (2007)
-
(2007)
IJSEKE
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
14
-
-
84885671683
-
-
Technical Report DISI-12-041, University of Trento
-
Paja, E., Dalpiaz, F., Giorgini, P.: Identifying conflicts in security requirements with STS-ml. Technical Report DISI-12-041, University of Trento (2012)
-
(2012)
Identifying Conflicts in Security Requirements with STS-ml
-
-
Paja, E.1
Dalpiaz, F.2
Giorgini, P.3
-
15
-
-
84870686816
-
STS-Tool: Socio-technical security requirements through social commitments
-
Paja, E., Dalpiaz, F., Poggianella, M., Roberti, P., Giorgini, P.: STS-Tool: socio-technical security requirements through social commitments. In: Proc. of RE 2012, pp. 331-332 (2012)
-
(2012)
Proc. of RE 2012
, pp. 331-332
-
-
Paja, E.1
Dalpiaz, F.2
Poggianella, M.3
Roberti, P.4
Giorgini, P.5
-
16
-
-
84894221832
-
The TasLab portal for collaborative innovation
-
Shvaiko, P., Mion, L., Dalpiaz, F., Angelini, G.: The TasLab portal for collaborative innovation. In: Proc. of ICE 2010 (2010)
-
(2010)
Proc. of ICE 2010
-
-
Shvaiko, P.1
Mion, L.2
Dalpiaz, F.3
Angelini, G.4
-
17
-
-
84870674699
-
Formative user-centered evaluation of security modeling: Results from a case study
-
Trösterer, S., Beck, E., Dalpiaz, F., Paja, E., Giorgini, P., Tscheligi, M.: Formative user-centered evaluation of security modeling: Results from a case study. IJSSE 3(1), 1-19 (2012)
-
(2012)
IJSSE
, vol.3
, Issue.1
, pp. 1-19
-
-
Trösterer, S.1
Beck, E.2
Dalpiaz, F.3
Paja, E.4
Giorgini, P.5
Tscheligi, M.6
-
18
-
-
0032203918
-
Managing conflicts in goal-driven requirements engineering
-
van Lamsweerde, A., Darimont, R., Letier, E.: Managing conflicts in goal-driven requirements engineering. IEEE TSE 24(11), 908-926 (1998)
-
(1998)
IEEE TSE
, vol.24
, Issue.11
, pp. 908-926
-
-
Van Lamsweerde, A.1
Darimont, R.2
Letier, E.3
|