Comparing TCD / SNet with two other formal analysis approaches based on i * : Formal Tropos and Secure Tropos
暂无分享,去创建一个
[1] Marco Pistore,et al. NuSMV 2: An OpenSource Tool for Symbolic Model Checking , 2002, CAV.
[2] Gerhard Lakemeyer,et al. SNet Reloaded: Roles, Monitoring and Agent Evolution , 2004, AOIS.
[3] J. McCarthy. Situations, Actions, and Causal Laws , 1963 .
[4] John Mylopoulos,et al. Modeling Social and Individual Trust in Requirements Engineering Methodologies , 2005, iTrust.
[5] M. Jarke,et al. Requirements modeling for organization networks: a (dis)trust-based approach , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.
[6] Matthias Jarke,et al. ConceptBase — A deductive object base for meta data management , 1995, Journal of Intelligent Information Systems.
[7] Andrew J. I. Jones,et al. Trust and Deception in Virtual Societies , 2001 .
[8] John Mylopoulos,et al. Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning , 2004, iTrust.
[9] Gerhard Lakemeyer,et al. Deliberation in a metadata-based modeling and simulation environment for inter-organizational networks , 2005, Inf. Syst..
[10] Yves Lespérance,et al. Agent-Oriented Requirements Engineering Using ConGolog and i* , 2001 .
[11] Fred Kröger,et al. Temporal Logic of Programs , 1987, EATCS Monographs on Theoretical Computer Science.
[12] John Mylopoulos,et al. Modeling security requirements through ownership, permission and delegation , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).
[13] John Mylopoulos,et al. Specifying and analyzing early requirements in Tropos , 2004, Requirements Engineering.
[14] Hector J. Levesque,et al. A concurrent programming language based on the situation calculus: Language and implementation , 1999 .