메뉴 건너뛰기




Volumn , Issue , 2007, Pages 188-206

An ontology for secure socio-technical systems

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84898314703     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-660-0.ch011     Document Type: Chapter
Times cited : (35)

References (36)
  • 1
  • 2
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • Anderson, R. (1994). Why cryptosystems fail. Communication of the ACM, 37(11), 32-40.
    • (1994) Communication of the ACM , vol.37 , Issue.11 , pp. 32-40
    • Anderson, R.1
  • 6
    • 0030182473 scopus 로고    scopus 로고
    • A framework to define a generic enterprise reference architecture and methodology
    • Bernus, P., & Nemes, L. (1996). A framework to define a generic enterprise reference architecture and methodology. Computer Integrated Manufacturing Systems, 9(3), 179-191.
    • (1996) Computer Integrated Manufacturing Systems , vol.9 , Issue.3 , pp. 179-191
    • Bernus, P.1    Nemes, L.2
  • 8
    • 84898222930 scopus 로고    scopus 로고
    • Associates, Retrieved June 15, 2007, from
    • Bryce, M., & Associates. (2006). PRIDE-EEM enterprise engineering methodology. Retrieved June 15, 2007, from http://www.phmainstreet.com/mba/pride/eemeth.htm
    • (2006) PRIDE-EEM Enterprise Engineering Methodology
    • Bryce, M.1
  • 9
    • 85041439566 scopus 로고    scopus 로고
    • Principles of trust for MAS: Cognitive anatomy, social importance, and quantification
    • IEEE Press
    • Castelfranchi, C., & Falcone, R. (1998). Principles of trust for MAS: Cognitive anatomy, social importance, and quantification. In International Conference on Multi-Agent Systems (pp. 72-79). IEEE Press.
    • (1998) In International Conference On Multi-Agent Systems , pp. 72-79
    • Castelfranchi, C.1    Falcone, R.2
  • 16
    • 84924413055 scopus 로고    scopus 로고
    • Security and trust requirements engineering
    • LNCS 3655, Springer
    • Giorgini, P., Massacci, F., & Zannone, N. (2005). Security and trust requirements engineering. In FOSAD III, LNCS 3655 (pp. 237-272). Springer.
    • (2005) In FOSAD III , pp. 237-272
    • Giorgini, P.1    Massacci, F.2    Zannone, N.3
  • 17
    • 84875309305 scopus 로고    scopus 로고
    • House of Lords, Retrieved June 15, 2007, from
    • House of Lords. (1999). Prince Jefri Bolkiah vs. KPMG. 1 All ER 517. Retrieved June 15, 2007, from www.parliament.the-stationeryoffice.co.uk
    • (1999) Prince Jefri Bolkiah Vs. KPMG. 1 All ER 517
  • 18
    • 84948180066 scopus 로고    scopus 로고
    • A model for the structural, functional, and deontic specification of organizations in multiagent Systems
    • Springer
    • Hübner, J.F., Sichman, J.S., & Boissier, O. (2002). A model for the structural, functional, and deontic specification of organizations in multiagent Systems. In Brazilian symposium on artificial intelligence (pp. 118-128). Springer.
    • (2002) In Brazilian Symposium On Artificial Intelligence , pp. 118-128
    • Hübner, J.F.1    Sichman, J.S.2    Boissier, O.3
  • 20
    • 17544394392 scopus 로고    scopus 로고
    • Computer security in the real world
    • Lampson, B.W. (2004). Computer security in the real world. Computer, 37(6), 37-46.
    • (2004) Computer , vol.37 , Issue.6 , pp. 37-46
    • Lampson, B.W.1
  • 24
    • 17744386721 scopus 로고    scopus 로고
    • Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
    • Massacci, F., Prest, M., & Zannone, N. (2005). Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Computer Standards & Interfaces, 27(5), 445-455.
    • (2005) Computer Standards & Interfaces , vol.27 , Issue.5 , pp. 445-455
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 26
    • 0042495505 scopus 로고
    • An integrative model of organizational trust
    • Mayer, R.C., Davis, J.H., & Schoorman, F.D. (1995). An integrative model of organizational trust. Acad. Management Rev, 20(3), 709-734.
    • (1995) Acad. Management Rev , vol.20 , Issue.3 , pp. 709-734
    • Mayer, R.C.1    Davis, J.H.2    Schoorman, F.D.3
  • 28
    • 0033442404 scopus 로고    scopus 로고
    • Conflict of interest and the credibility of underwriter analyst recommendations
    • Michaely, R., & Womack, K.L. (1999). Conflict of interest and the credibility of underwriter analyst recommendations. Review of Financial Studies, 12(4), 653-686.
    • (1999) Review of Financial Studies , vol.12 , Issue.4 , pp. 653-686
    • Michaely, R.1    Womack, K.L.2
  • 29
    • 2442512413 scopus 로고    scopus 로고
    • OASIS, OASIS Standard. Retrieved June 15, 2007, from
    • OASIS. (2005). eXtensible access control markup language (XACML) Version 2.0. OASIS Standard. Retrieved June 15, 2007, from http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-specos.pdf
    • (2005) EXtensible Access Control Markup Language (XACML) Version 2.0
  • 30
    • 57649209186 scopus 로고    scopus 로고
    • Not so different after all: A cross-discipline view of trust
    • Rousseau, D.M., Sitkin, S.B., Burt, R.S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Acad. Management Rev., 23(3), 393-404.
    • (1998) Acad. Management Rev , vol.23 , Issue.3 , pp. 393-404
    • Rousseau, D.M.1    Sitkin, S.B.2    Burt, R.S.3    Camerer, C.4
  • 32
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G., & Opdahl, A.L. (2005). Eliciting security requirements with misuse cases. Requirements Engineering Journal, 10(1), 34-44.
    • (2005) Requirements Engineering Journal , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.