메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 151-161

Security and privacy requirements analysis within a social setting

Author keywords

Privacy

Indexed keywords

ACCESS CONTROL; DATA PRIVACY; DECISION MAKING; MODELING LANGUAGES; REQUIREMENTS ENGINEERING;

EID: 84942866002     PISSN: 1090705X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICRE.2003.1232746     Document Type: Conference Paper
Times cited : (307)

References (25)
  • 3
    • 84979855000 scopus 로고
    • Dealing with Security Requirements During the Development of Information Systems
    • Collette Rolland, Francois Bodart, Corine Cauvet (Eds.). Springer
    • th Int. Conf. Advanced Information Systems Engineering, Collette Rolland, Francois Bodart, Corine Cauvet (Eds.). Springer, 1993. pp.234-251
    • (1993) th Int. Conf. Advanced Information Systems Engineering , pp. 234-251
    • Chung, L.1
  • 8
    • 84974691155 scopus 로고    scopus 로고
    • Reasoning with Goal Models
    • 21th International Conference on Conceptual Modeling (ER-2002). Tampere, Finland, October 167-181, 2002. Springer Verlag
    • Giorgini, P., Mylopoulos, J., Nicchiarelli, E., Sebastiani, R.. Reasoning with Goal Models. 21th International Conference on Conceptual Modeling (ER-2002). Tampere, Finland, October 167-181, 2002. LNCS 2503 Springer Verlag. pp. 232-246.
    • LNCS , vol.2503 , pp. 232-246
    • Giorgini, P.1    Mylopoulos, J.2    Nicchiarelli, E.3    Sebastiani, R.4
  • 9
    • 15944398393 scopus 로고    scopus 로고
    • A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
    • Anton, A. eds. Special Issue on Requirements Engineering for Information Security. Loucopoulos, P., Mylopoulos, J. eds
    • Helmer, G., Wong, J., Slagell, M., Honavar, V. Miller, L., Lutz, R. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. Anton, A. eds. Special Issue on Requirements Engineering for Information Security. Loucopoulos, P., Mylopoulos, J. eds. Requirements Engineering. Vol. 7, No. 4, 2002. pp. 177-220.
    • (2002) Requirements Engineering , vol.7 , Issue.4 , pp. 177-220
    • Helmer, G.1    Wong, J.2    Slagell, M.3    Honavar, V.4    Miller, L.5    Lutz, R.6
  • 17
    • 0036870125 scopus 로고    scopus 로고
    • Special Issue: The Technology of Trust
    • November/December
    • Sandhu, R. eds. Special Issue: The Technology of Trust. IEEE Internet Computing, November/December 2002. pp. 28-53.
    • (2002) IEEE Internet Computing , pp. 28-53
    • Sandhu, R.1
  • 18
    • 0002670359 scopus 로고    scopus 로고
    • Attack Trees Modeling Security Threats
    • December Also available at
    • Schneier, B. Attack Trees Modeling Security Threats. Dr. Dobb's Journal, December 1999. Also available at:http://www.counterpane.com/attacktrees-ddj-ft.html.
    • (1999) Dr. Dobb's Journal
    • Schneier, B.1
  • 24
    • 84942921136 scopus 로고    scopus 로고
    • Modeling Trust for System Design Using the i∗ Strategic Actors Framework
    • Trust in Cyber-Societies - Integrating the Human and Artificial Perspectives. R. Falcone, M. Singh, Y.H. Tan, eds. Springer
    • Yu, E. and Liu, L. Modeling Trust for System Design Using the i∗ Strategic Actors Framework. In: Trust in Cyber-Societies - Integrating the Human and Artificial Perspectives. R. Falcone, M. Singh, Y.H. Tan, eds. LNAI-2246. Springer,2001. pp. 175-194.
    • (2001) LNAI , vol.2246 , pp. 175-194
    • Yu, E.1    Liu, L.2
  • 25
    • 84956854380 scopus 로고    scopus 로고
    • Modeling Strategic Actor Relationships to Support Intellectual Property Management
    • 20th International Conference on Conceptual Modeling (ER-2001). Yokohama, Japan, November 27-30, 2001. Spring Verlag
    • Yu, E., Liu, L., Li, Y. Modeling Strategic Actor Relationships to Support Intellectual Property Management. 20th International Conference on Conceptual Modeling (ER-2001). Yokohama, Japan, November 27-30, 2001. LNCS 2224 Spring Verlag. pp. 164-178.
    • LNCS , vol.2224 , pp. 164-178
    • Yu, E.1    Liu, L.2    Li, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.