The Socio-technical Security Requirements Modelling Language for Secure Composite Services
暂无分享,去创建一个
[1] Bernhard Thalheim,et al. Conceptual Modeling - ER 2007 , 2007, Lecture Notes in Computer Science.
[2] John Mylopoulos,et al. Modeling security requirements through ownership, permission and delegation , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).
[3] Munindar P. Singh. An ontology for commitments in multiagent systems: , 1999, Artificial Intelligence and Law.
[4] Munindar P. Singh. An ontology for commitments in multiagent systems: , 1999, Artificial Intelligence and Law.
[5] Paolo Giorgini,et al. Security requirements engineering via commitments , 2011, 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST).
[6] Manfred Tscheligi,et al. Formative User-Centered Evaluation of Security Modeling: Results from a Case Study , 2012, Int. J. Secur. Softw. Eng..
[7] Eric Yu,et al. Modeling Strategic Relationships for Process Reengineering , 1995, Social Modeling for Requirements Engineering.
[8] John Mylopoulos,et al. Adaptation in Open Systems: Giving Interaction Its Rightful Place , 2010, ER.
[9] Eric Mayer. Service Oriented Computing Semantics Processes Agents , 2016 .
[10] Peretz Shoval,et al. Conceptual Modeling - ER 2010, 29th International Conference on Conceptual Modeling, Vancouver, BC, Canada, November 1-4, 2010. Proceedings , 2010, ER.
[11] Eric S. K. Yu,et al. A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs , 2007, ER.
[12] Georg Gottlob,et al. Disjunctive datalog , 1997, TODS.