Security Design Based on Social Modeling
暂无分享,去创建一个
John Mylopoulos | Lin Liu | Eric S. K. Yu | J. Mylopoulos | E. Yu | Lin Liu
[1] Yao-Hua Tan,et al. Trust in Cyber-societies: Integrating the Human and Artificial Perspectives , 2000, Lecture Notes in Computer Science.
[2] Axel van Lamsweerde,et al. Handling Obstacles in Goal-Oriented Requirements Engineering , 2000, IEEE Trans. Software Eng..
[3] John P. McDermott,et al. Using abuse case models for security requirements analysis , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[4] Lin Liu,et al. Modelling Trust for System Design Using the i* Strategic Actors Framework , 2000, Trust in Cyber-societies.
[5] Eric S. K. Yu,et al. Agent-Oriented Modelling: Software versus the World , 2001, AOSE.
[6] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[7] John Mylopoulos,et al. Modeling security requirements through ownership, permission and delegation , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).
[8] Ross J. Anderson,et al. A security policy model for clinical information systems , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[9] Ravi S. Sandhu. Good-Enough Security: Toward a Pragmatic Business-Driven Discipline , 2003, IEEE Internet Comput..
[10] Lawrence Chung,et al. Dealing with Security Requirements During the Development of Information Systems , 1993, CAiSE.
[11] Vasant Honavar,et al. A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System , 2002, Requirements Engineering.
[12] Eric S. K. Yu,et al. Towards modelling and reasoning support for early-phase requirements engineering , 1997, Proceedings of ISRE '97: 3rd IEEE International Symposium on Requirements Engineering.
[13] RICHAFID BASKERVILLE,et al. Information systems security design methods: implications for information systems development , 1993, CSUR.
[14] Andreas L. Opdahl,et al. Templates for Misuse Case Description , 2001 .
[15] Bruce Schneier,et al. Beyond fear - thinking sensibly about security in an uncertain world , 2003 .
[16] Richard Baskerville. Designing information systems security , 1988 .
[17] John Mylopoulos,et al. Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..