Designing Security Requirements Models Through Planning
暂无分享,去创建一个
John Mylopoulos | Fabio Massacci | Volha Bryl | Nicola Zannone | J. Mylopoulos | Volha Bryl | Nicola Zannone | F. Massacci
[1] John Mylopoulos,et al. Modeling security requirements through ownership, permission and delegation , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).
[2] Daniel S. Weld. Recent Advances in AI Planning , 1999, AI Mag..
[3] Steve Roach,et al. Automated Procedure Construction for Deductive Synthesis , 2005, Automated Software Engineering.
[4] Michael J. Gallivan,et al. Striking a balance between trust and control in a virtual organization: a content analysis of open source software case studies , 2001, Inf. Syst. J..
[5] Peter F. Drucker,et al. Managing the Non-Profit Organization: Principles and Practices , 1992 .
[6] Axel van Lamsweerde,et al. From system goals to intruder anti-goals: attack generation and resolution for security requirements engineering , 2003 .
[7] Joachim Peer,et al. Web Service Composition as AI Planning { a Survey ⁄ , 2005 .
[8] Fabio Massacci,et al. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation , 2005, Comput. Stand. Interfaces.
[9] Enn Tyugu,et al. Strategies of Structural Synthesis of Programs and its Extensions , 2001, Comput. Artif. Intell..
[10] John Mylopoulos,et al. Modeling Social and Individual Trust in Requirements Engineering Methodologies , 2005, iTrust.
[11] Hector J. Levesque,et al. ConGolog, a concurrent programming language based on the situation calculus , 2000, Artif. Intell..
[12] B. Hillebrand,et al. Trust, Contract and Relationship Development , 2005 .
[13] John Mylopoulos,et al. Towards requirements-driven information systems engineering: the Tropos project , 2002, Inf. Syst..
[14] Rocco Moretti,et al. Model Driven Architecture (MDA) , 2007 .
[15] W. Hamilton,et al. The evolution of cooperation. , 1984, Science.
[16] Avrim Blum,et al. Fast Planning Through Planning Graph Analysis , 1995, IJCAI.
[17] Herbert A. Simon,et al. The Sciences of the Artificial , 1970 .
[18] Bashar Nuseibeh,et al. Using trust assumptions with security requirements , 2005, Requirements Engineering.
[19] N. Luhmann. Trust and Power , 1979 .
[20] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[21] John Mylopoulos,et al. Requirements Analysis for Socio-technical Systems: Exploring and Evaluating Alternatives , 2006 .
[22] Axel van Lamsweerde,et al. Reasoning about partial goal satisfaction for requirements and design engineering , 2004, SIGSOFT '04/FSE-12.
[23] Thomas Ellman. Specification and synthesis of hybrid automata for physics-based animation , 2004, Automated Software Engineering.
[24] Ketil Stølen,et al. What is model driven architecture , 2003 .
[25] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[26] Bart Selman,et al. Planning as Satisfiability , 1992, ECAI.
[27] Craig A. Knoblock,et al. PDDL-the planning domain definition language , 1998 .
[28] Zohar Manna,et al. A Deductive Approach to Program Synthesis , 1979, TOPL.
[29] John P. McDermott,et al. Using abuse case models for security requirements analysis , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[30] Lin Liu,et al. Modelling Trust for System Design Using the i* Strategic Actors Framework , 2000, Trust in Cyber-societies.
[31] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[32] W. Hamilton,et al. The Evolution of Cooperation , 1984 .
[33] Craig A. Knoblock,et al. Web service composition as planning , 2003 .
[34] James L. Caldwell,et al. Moving proofs-as-programs into practice , 1997, Proceedings 12th IEEE International Conference Automated Software Engineering.
[35] G. Lakemeyer,et al. Modeling the Impact of Trust and Distrust in Agent Networks , 2022 .