STS-Tool: Security Requirements Engineering for Socio-Technical Systems
暂无分享,去创建一个
[1] Elisa Bertino,et al. A flexible authorization mechanism for relational data management systems , 1999, TOIS.
[2] John Mylopoulos,et al. Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[3] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[4] Eric Yu,et al. Modeling Strategic Relationships for Process Reengineering , 1995, Social Modeling for Requirements Engineering.
[5] Herbert J. Mattord,et al. Principles of Information Security, 4th Edition , 2011 .
[6] Paolo Giorgini,et al. Managing Security Requirements Conflicts in Socio-Technical Systems , 2013, ER.
[7] Munindar P. Singh. An ontology for commitments in multiagent systems: , 1999, Artificial Intelligence and Law.
[8] Munindar P. Singh. An ontology for commitments in multiagent systems: , 1999, Artificial Intelligence and Law.
[9] John Mylopoulos,et al. Modeling security requirements through ownership, permission and delegation , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).
[10] Haralambos Mouratidis,et al. Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..
[11] Paolo Giorgini,et al. Security requirements engineering via commitments , 2011, 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST).
[12] John Mylopoulos,et al. Adaptive socio-technical systems: a requirements-based approach , 2011, Requirements Engineering.