System security requirements analysis with answer set programming
暂无分享,去创建一个
[1] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[2] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2000, Proceedings 37th International Conference on Technology of Object-Oriented Languages and Systems. TOOLS-Pacific 2000.
[3] Peter Rittgen,et al. Handbook of Ontologies for Business Interaction , 2007 .
[4] Nobukazu Yoshioka,et al. Effective Security Impact Analysis with Patterns for Software Enhancement , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[5] Miroslaw Truszczynski,et al. Answer set programming at a glance , 2011, Commun. ACM.
[6] Enrico Pontelli. Answer Set Programming in 2010: A Personal Perspective , 2010, PADL.
[7] Nancy R. Mead,et al. Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.
[8] Richard Kissel,et al. Security Considerations in the System Development Life Cycle , 2008 .
[9] Alex M. Andrew,et al. Knowledge Representation, Reasoning and Declarative Problem Solving , 2004 .
[10] John Mylopoulos,et al. An ontology for secure socio-technical systems , 2007 .
[11] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[12] Nancy R. Mead,et al. Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.
[13] Jim Alves-Foss,et al. Formal Verification and Visualization of Security Policies , 2008, J. Comput..