Security Requirements Engineering for Service-Oriented Applications
暂无分享,去创建一个
[1] Haralambos Mouratidis,et al. Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..
[2] Eric Yu,et al. Modeling Strategic Relationships for Process Reengineering , 1995, Social Modeling for Requirements Engineering.
[3] Paolo Giorgini,et al. Security requirements engineering via commitments , 2011, 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST).
[4] John Mylopoulos,et al. Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard , 2003, ER.
[5] John Mylopoulos,et al. Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[6] Munindar P. Singh. An ontology for commitments in multiagent systems: , 1999, Artificial Intelligence and Law.
[7] John Mylopoulos,et al. Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments , 2010, CAiSE.