-
1
-
-
0003556063
-
Characteristics of socio-technical systems
-
Tavistock Institute London
-
F.E. Emery Characteristics of socio-technical systems Tech. Rep. 527 1959 Tavistock Institute London
-
(1959)
Tech. Rep.
, vol.527
-
-
Emery, F.E.1
-
2
-
-
84863737158
-
Large-scale complex IT systems
-
I. Sommerville, D. Cliff, R. Calinescu, J. Keen, T. Kelly, M. Kwiatkowska, J. Mcdermid, and R. Paige Large-scale complex IT systems Commun. ACM 55 7 2012 71 77
-
(2012)
Commun. ACM
, vol.55
, Issue.7
, pp. 71-77
-
-
Sommerville, I.1
Cliff, D.2
Calinescu, R.3
Keen, J.4
Kelly, T.5
Kwiatkowska, M.6
Mcdermid, J.7
Paige, R.8
-
3
-
-
84874019176
-
Adaptive socio-technical systems: A requirements-driven approach
-
F. Dalpiaz, P. Giorgini, and J. Mylopoulos Adaptive socio-technical systems: a requirements-driven approach Requir. Eng. 18 4 2013 1 24
-
(2013)
Requir. Eng.
, vol.18
, Issue.4
, pp. 1-24
-
-
Dalpiaz, F.1
Giorgini, P.2
Mylopoulos, J.3
-
6
-
-
77950516969
-
A systematic review of security requirements engineering
-
D. Mellado, C. Blanco, L.E. Sánchez, and E. Fernández-Medina A systematic review of security requirements engineering Comput. Stand. Interfaces 32 4 2010 153 165
-
(2010)
Comput. Stand. Interfaces
, vol.32
, Issue.4
, pp. 153-165
-
-
Mellado, D.1
Blanco, C.2
Sánchez, L.E.3
Fernández-Medina, E.4
-
7
-
-
2942713443
-
Security use cases
-
D.G. Firesmith Security use cases J. Object Technol. 2 3 2003 53 64
-
(2003)
J. Object Technol.
, vol.2
, Issue.3
, pp. 53-64
-
-
Firesmith, D.G.1
-
10
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requir. Eng. 10 1 2005 34 44
-
(2005)
Requir. Eng.
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
12
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
C.B. Haley, R.R. Laney, J.D. Moffett, and B. Nuseibeh Security requirements engineering: a framework for representation and analysis IEEE Trans. Softw. Eng. 34 1 2008 133 153
-
(2008)
IEEE Trans. Softw. Eng.
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.B.1
Laney, R.R.2
Moffett, J.D.3
Nuseibeh, B.4
-
13
-
-
27644537252
-
Modeling security requirements through ownership, permission and delegation
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone Modeling security requirements through ownership, permission and delegation Proceedings of the 13th IEEE International Conference on Requirements Engineering 2005 167 176
-
(2005)
Proceedings of the 13th IEEE International Conference on Requirements Engineering
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
14
-
-
34249004734
-
Secure Tropos: A security-oriented extension of the Tropos methodology
-
H. Mouratidis, and P. Giorgini Secure Tropos: a security-oriented extension of the Tropos methodology Int. J. Softw. Eng. Knowl. Eng. 17 2 2007 285 309
-
(2007)
Int. J. Softw. Eng. Knowl. Eng.
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
16
-
-
0028481195
-
Inconsistency handling in multiperspective specifications
-
A. Finkelstein, D. Gabbay, A. Hunter, J. Kramer, and B. Nuseibeh Inconsistency handling in multiperspective specifications IEEE TSE 20 8 1994 569 578
-
(1994)
IEEE TSE
, vol.20
, Issue.8
, pp. 569-578
-
-
Finkelstein, A.1
Gabbay, D.2
Hunter, A.3
Kramer, J.4
Nuseibeh, B.5
-
17
-
-
84870674699
-
Formative user-centered evaluation of security modeling: Results from a case study
-
S. Trösterer, E. Beck, F. Dalpiaz, E. Paja, P. Giorgini, and M. Tscheligi Formative user-centered evaluation of security modeling: results from a case study Int. J. Secure Softw. Eng. 3 1 2012 1 19
-
(2012)
Int. J. Secure Softw. Eng.
, vol.3
, Issue.1
, pp. 1-19
-
-
Trösterer, S.1
Beck, E.2
Dalpiaz, F.3
Paja, E.4
Giorgini, P.5
Tscheligi, M.6
-
18
-
-
84879853433
-
Modelling security requirements in socio-technical systems with STS-Tool
-
CEUR-WS
-
E. Paja, F. Dalpiaz, M. Poggianella, P. Roberti, and P. Giorgini Modelling security requirements in socio-technical systems with STS-Tool Proceedings of the Forum at the 24th International Conference on Advanced Information Systems Engineering CEUR-WS vol. 855 2012 155 162
-
(2012)
Proceedings of the Forum at the 24th International Conference on Advanced Information Systems Engineering
, vol.855
, pp. 155-162
-
-
Paja, E.1
Dalpiaz, F.2
Poggianella, M.3
Roberti, P.4
Giorgini, P.5
-
19
-
-
84870686816
-
STS-Tool: Socio-technical security requirements through social commitments
-
E. Paja, F. Dalpiaz, M. Poggianella, P. Roberti, and P. Giorgini STS-Tool: socio-technical security requirements through social commitments Proceedings of the 20th IEEE International Conference on Requirements Engineering 2012 331 332
-
(2012)
Proceedings of the 20th IEEE International Conference on Requirements Engineering
, pp. 331-332
-
-
Paja, E.1
Dalpiaz, F.2
Poggianella, M.3
Roberti, P.4
Giorgini, P.5
-
25
-
-
67649640510
-
Glossary of key information security terms
-
NIST
-
R. Kissel Glossary of key information security terms Tech. Rep. IR 7298 Rev 1 2011 NIST
-
(2011)
Tech. Rep. IR 7298 Rev 1
-
-
Kissel, R.1
-
26
-
-
84942827553
-
-
BS ISO/IEC 27005:2011 Tech. rep. 2011 ISO/IEC
-
BS ISO/IEC 27005:2011 Tech. rep. 2011 ISO/IEC
-
-
-
-
27
-
-
84870686816
-
STS-Tool: Socio-technical security requirements through social commitments
-
E. Paja, F. Dalpiaz, M. Poggianella, P. Roberti, and P. Giorgini STS-Tool: socio-technical security requirements through social commitments Proc. of RE'12 2012 331 332
-
(2012)
Proc. of RE'12
, pp. 331-332
-
-
Paja, E.1
Dalpiaz, F.2
Poggianella, M.3
Roberti, P.4
Giorgini, P.5
-
28
-
-
84885671683
-
Identifying conflicts in security requirements with STS-ml
-
University of Trento
-
E. Paja, F. Dalpiaz, and P. Giorgin Identifying conflicts in security requirements with STS-ml Tech. Rep. DISI-12-041 2012 University of Trento (http://disi.unitn.it/paja/tr-identifying-sec-conflicts.pdf)
-
(2012)
Tech. Rep. DISI-12-041
-
-
Paja, E.1
Dalpiaz, F.2
Giorgin, P.3
-
33
-
-
13844255590
-
Goal-oriented requirements analysis and reasoning in the Tropos methodology
-
P. Giorgini, J. Mylopoulos, and R. Sebastiani Goal-oriented requirements analysis and reasoning in the Tropos methodology Eng. Appl. Artif. Intell. 18 2 2005 159 171
-
(2005)
Eng. Appl. Artif. Intell.
, vol.18
, Issue.2
, pp. 159-171
-
-
Giorgini, P.1
Mylopoulos, J.2
Sebastiani, R.3
-
34
-
-
84876362086
-
Evaluating goal achievement in enterprise modeling - An interactive procedure and experiences
-
Springer
-
J. Horkoff, and E. Yu Evaluating goal achievement in enterprise modeling - an interactive procedure and experiences The Practice of Enterprise Modeling 2009 Springer 145 160
-
(2009)
The Practice of Enterprise Modeling
, pp. 145-160
-
-
Horkoff, J.1
Yu, E.2
-
40
-
-
84897974165
-
More than modelling and hiding: Towards a comprehensive view of Web mining and privacy
-
B. Berendt More than modelling and hiding: towards a comprehensive view of Web mining and privacy Data Min. Knowl. Disc. 24 3 2012 697 737
-
(2012)
Data Min. Knowl. Disc.
, vol.24
, Issue.3
, pp. 697-737
-
-
Berendt, B.1
-
42
-
-
80051893382
-
Representing and reasoning about preferences in requirements engineering
-
S. Liaskos, S.A. McIlraith, S. Sohrabi, and J. Mylopoulos Representing and reasoning about preferences in requirements engineering Requir. Eng. 16 3 2011 227 249
-
(2011)
Requir. Eng.
, vol.16
, Issue.3
, pp. 227-249
-
-
Liaskos, S.1
McIlraith, S.A.2
Sohrabi, S.3
Mylopoulos, J.4
|