Analyzing Trust Requirements in Socio-Technical Systems: A Belief-Based Approach
暂无分享,去创建一个
[1] John Mylopoulos,et al. Reasoning with Goal Models , 2002, ER.
[2] Paolo Giorgini,et al. Modeling and Reasoning About Information Quality Requirements , 2015, REFSQ.
[3] Daniel L. Moody,et al. The “Physics” of Notations: Toward a Scientific Basis for Constructing Visual Notations in Software Engineering , 2009, IEEE Transactions on Software Engineering.
[4] A. Kyle,et al. The Flash Crash: The Impact of High Frequency Trading on an Electronic Market , 2011 .
[5] Jordi Sabater-Mir,et al. Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.
[6] William A. Wallace,et al. Trust in electronic environments , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[7] Nicola Zannone. A requirements engineering methodology for trust, security, and privacy , 2007 .
[8] Fabio Massacci,et al. From Trust to Dependability through Risk Analysis , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[9] Martin Bichler,et al. Design science in information systems research , 2006, Wirtschaftsinf..
[10] Mario Alviano,et al. The Disjunctive Datalog System DLV , 2010, Datalog.
[11] John Mylopoulos,et al. Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures , 2004, EuroPKI.
[12] Yao-Hua Tan,et al. Trust and Deception in Virtual Societies , 2001, Springer Netherlands.
[13] Axel van Lamsweerde,et al. Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.
[14] Anand S. Rao,et al. Modeling Rational Agents within a BDI-Architecture , 1997, KR.
[15] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[16] John Mylopoulos,et al. Modeling Social and Individual Trust in Requirements Engineering Methodologies , 2005, iTrust.
[17] C. Castelfranchi,et al. Social Trust : A Cognitive Approach , 2000 .
[18] B. Esfandiari,et al. On How Agents Make Friends: Mechanisms for Trust Acquisition , 2000 .
[19] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[20] A. Kyle,et al. The Flash Crash: High-Frequency Trading in an Electronic Market , 2017 .
[21] Paolo Giorgini,et al. Sociotechnical Trust: An Architectural Approach , 2011, ER.
[22] Michael Rovatsos,et al. Using trust for detecting deceitful agents in artificial societies , 2000, Appl. Artif. Intell..
[23] Haralambos Mouratidis,et al. Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..
[24] Radu Calinescu,et al. Large-scale complex IT systems , 2011, Commun. ACM.
[25] Paolo Giorgini,et al. Detecting Conflicts in Information Quality Requirements: the May 6, 2010 Flash Crash , 2014 .