Social threats and the new challenges for Requirements Engineering
暂无分享,去创建一个
[1] John Mylopoulos,et al. Adaptation in Open Systems: Giving Interaction Its Rightful Place , 2010, ER.
[2] Munindar P. Singh. Agent Communication Languages: Rethinking the Principles , 1998, Computer.
[3] John Mylopoulos,et al. Designing Law-Compliant Software Requirements , 2009, ER.
[4] Munindar P. Singh,et al. Commitments with regulations: reasoning about safety and control in REGULA , 2011, AAMAS.
[5] Doug Schuler,et al. Social computing , 1994, CACM.
[6] Munindar P. Singh,et al. Elements of a Business-Level Architecture for Multiagent Systems , 2009, PROMAS.
[7] John Mylopoulos,et al. Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments , 2010, CAiSE.
[8] Wenji Mao,et al. Social Computing: From Social Informatics to Social Intelligence , 2007, IEEE Intell. Syst..
[9] Gary McGraw,et al. Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors , 2005, IEEE Secur. Priv..
[10] Bruce Christianson,et al. Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.