-
2
-
-
35048861274
-
Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy
-
Earp, J.B., Reese, A. Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy. IEEE Joint International Requirements Engineering Conference (RE'02). Essen, Germany, September 9-13, 2002.pp.23-31
-
IEEE Joint International Requirements Engineering Conference (RE'02). Essen, Germany, September 9-13, 2002
, pp. 23-31
-
-
Earp, J.B.1
Reese, A.2
-
3
-
-
84979855000
-
Dealing with Security Requirements During the Development of Information Systems
-
Collette Rolland, Francois Bodart, Corine Cauvet (Eds.). Springer
-
th Int. Conf. Advanced Information Systems Engineering, Collette Rolland, Francois Bodart, Corine Cauvet (Eds.). Springer, 1993. pp.234-251
-
(1993)
th Int. Conf. Advanced Information Systems Engineering
, pp. 234-251
-
-
Chung, L.1
-
4
-
-
0003696305
-
-
Kluwer Academic Publishers
-
Chung, L., Nixon, B. A., Yu, E. and Mylopoulos, J. Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers, 2000.
-
(2000)
Non-Functional Requirements in Software Engineering
-
-
Chung, L.1
Nixon, B.A.2
Yu, E.3
Mylopoulos, J.4
-
5
-
-
84948972584
-
Security Requirements Engineering: When Anti-requirements Hit the Fan
-
Crook, R., Ince, D., Lin, L., Nuseibeh, B. Security Requirements Engineering: When Anti-requirements Hit the Fan. IEEE Joint International Requirements Engineering Conference (RE'02). Essen, Germany, September 9-13, 2002.pp.203-205.
-
IEEE Joint International Requirements Engineering Conference (RE'02). Essen, Germany, September 9-13, 2002
, pp. 203-205
-
-
Crook, R.1
Ince, D.2
Lin, L.3
Nuseibeh, B.4
-
6
-
-
84942897457
-
Authentic Data publication over the Internet
-
Also available at
-
Devanbu, P., Gertz, M, Martel, C., Stubblebine, S.G. Authentic Data publication over the Internet. Journal of Computer Security. Also available at: http://sirius.cs.ucdavis.edu/publications/jcs1.pdf.
-
Journal of Computer Security
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.G.4
-
7
-
-
0034829384
-
Model Checking Early Requirements Specifications in Tropos
-
Fuxman, A., Pistore, M., Mylopoulos, J., and Traverso, P. Model Checking Early Requirements Specifications in Tropos, 5th IEEE Int. Symposium on Requirements Engineering (RE'01), Toronto, August 2001. pp.174-181.
-
5th IEEE Int. Symposium on Requirements Engineering (RE'01), Toronto, August 2001
, pp. 174-181
-
-
Fuxman, A.1
Pistore, M.2
Mylopoulos, J.3
Traverso, P.4
-
8
-
-
84974691155
-
Reasoning with Goal Models
-
21th International Conference on Conceptual Modeling (ER-2002). Tampere, Finland, October 167-181, 2002. Springer Verlag
-
Giorgini, P., Mylopoulos, J., Nicchiarelli, E., Sebastiani, R.. Reasoning with Goal Models. 21th International Conference on Conceptual Modeling (ER-2002). Tampere, Finland, October 167-181, 2002. LNCS 2503 Springer Verlag. pp. 232-246.
-
LNCS
, vol.2503
, pp. 232-246
-
-
Giorgini, P.1
Mylopoulos, J.2
Nicchiarelli, E.3
Sebastiani, R.4
-
9
-
-
15944398393
-
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
-
Anton, A. eds. Special Issue on Requirements Engineering for Information Security. Loucopoulos, P., Mylopoulos, J. eds
-
Helmer, G., Wong, J., Slagell, M., Honavar, V. Miller, L., Lutz, R. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. Anton, A. eds. Special Issue on Requirements Engineering for Information Security. Loucopoulos, P., Mylopoulos, J. eds. Requirements Engineering. Vol. 7, No. 4, 2002. pp. 177-220.
-
(2002)
Requirements Engineering
, vol.7
, Issue.4
, pp. 177-220
-
-
Helmer, G.1
Wong, J.2
Slagell, M.3
Honavar, V.4
Miller, L.5
Lutz, R.6
-
13
-
-
84942860672
-
Analyzing Security Requirements as Relationships Among Strategic Actors
-
Liu, L., Yu, E., Mylopoulos, J. Analyzing Security Requirements as Relationships Among Strategic Actors. 2nd Symposium on Requirements Engineering for Information Security (SREIS'02). Raleigh, North Carolina, October 16, 2002.
-
2nd Symposium on Requirements Engineering for Information Security (SREIS'02). Raleigh, North Carolina, October 16, 2002
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
15
-
-
0025498594
-
Telos: Representing Knowledge About Information Systems
-
October
-
Mylopoulos, J., Borgida, A., Jarke, M. and Koubarakis, M. Telos: Representing Knowledge About Information Systems. ACM Transactions on Information Systems 8(4), October 1990.
-
(1990)
ACM Transactions on Information Systems
, vol.8
, Issue.4
-
-
Mylopoulos, J.1
Borgida, A.2
Jarke, M.3
Koubarakis, M.4
-
16
-
-
0030086382
-
Role-Based Access Control Models
-
Feburary
-
Sandhu, R. S., Coyne, E.J., Feinstein, H.L., Youman, C.E. Role-Based Access Control Models. IEEE Computer, Vol.29, No.2, Feburary 1996. pp. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
17
-
-
0036870125
-
Special Issue: The Technology of Trust
-
November/December
-
Sandhu, R. eds. Special Issue: The Technology of Trust. IEEE Internet Computing, November/December 2002. pp. 28-53.
-
(2002)
IEEE Internet Computing
, pp. 28-53
-
-
Sandhu, R.1
-
18
-
-
0002670359
-
Attack Trees Modeling Security Threats
-
December Also available at
-
Schneier, B. Attack Trees Modeling Security Threats. Dr. Dobb's Journal, December 1999. Also available at:http://www.counterpane.com/attacktrees-ddj-ft.html.
-
(1999)
Dr. Dobb's Journal
-
-
Schneier, B.1
-
19
-
-
13644265503
-
Templates for Misuse Case Description
-
th International Workshop on Requirements Engineering, Foundation for Software Quality (REFSQ'2001), Switzerland, June 4-5, 2001.
-
th International Workshop on Requirements Engineering, Foundation for Software Quality (REFSQ'2001), Switzerland, June 4-5, 2001
-
-
Sindre, G.1
Opdahl, A.L.2
-
23
-
-
77953102517
-
Designing for Privacy and Other Competing Requirements
-
Yu, E., Cysneiros, L. Designing for Privacy and Other Competing Requirements. 2nd Symposium on Requirements Engineering for Information Security (SREIS'02). Raleigh, North Carolina, October 16, 2002.
-
2nd Symposium on Requirements Engineering for Information Security (SREIS'02). Raleigh, North Carolina, October 16, 2002
-
-
Yu, E.1
Cysneiros, L.2
-
24
-
-
84942921136
-
Modeling Trust for System Design Using the i∗ Strategic Actors Framework
-
Trust in Cyber-Societies - Integrating the Human and Artificial Perspectives. R. Falcone, M. Singh, Y.H. Tan, eds. Springer
-
Yu, E. and Liu, L. Modeling Trust for System Design Using the i∗ Strategic Actors Framework. In: Trust in Cyber-Societies - Integrating the Human and Artificial Perspectives. R. Falcone, M. Singh, Y.H. Tan, eds. LNAI-2246. Springer,2001. pp. 175-194.
-
(2001)
LNAI
, vol.2246
, pp. 175-194
-
-
Yu, E.1
Liu, L.2
-
25
-
-
84956854380
-
Modeling Strategic Actor Relationships to Support Intellectual Property Management
-
20th International Conference on Conceptual Modeling (ER-2001). Yokohama, Japan, November 27-30, 2001. Spring Verlag
-
Yu, E., Liu, L., Li, Y. Modeling Strategic Actor Relationships to Support Intellectual Property Management. 20th International Conference on Conceptual Modeling (ER-2001). Yokohama, Japan, November 27-30, 2001. LNCS 2224 Spring Verlag. pp. 164-178.
-
LNCS
, vol.2224
, pp. 164-178
-
-
Yu, E.1
Liu, L.2
Li, Y.3
|