Loading...
 

Security Requirements Engineering

  • R. Matulevicius, N. Mayer, H. Mouratidis, E. Dubois, P. Heymans, and N. Genon. Adapting Secure Tropos for Security Risk Management during Early Phases of the Information Systems Development. Proceedings of the 20th International Conference on Advanced Information Systems Engineering (CAiSE'08), 541-555, 2008.
  • J. Cabot,N. Zannone. Towards an Integrated Framework for Model-driven Security Engineering. Modeling Security Workshop (MoDELS'08). CEUR Workshop Proceedings. Vol-413
  • P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proceedings of the 14th IEEE International Requirements Engineering Conference (RE'06). IEEE Computer Society Press, 2006. To appear.
  • V. Bryl, F. Massacci, J. Mylopoulos and N. Zannone. Designing Security Requirements Models through Planning. In Proceedings of the 18th Conference on Advanced Information Systems Engineering (CAiSE'06), 2006. To appear.
  • F. Massacci, M. Prest and N. Zannone. Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation. Computer Standards & Interfaces, 27(5):445-455, 2005.
  • N. Mayer, A. Rifaut, E. Dubois: Towards a Risk-Based Security Requirements Engineering Framework. 11th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'05), in conjunction with CAiSE'05, Porto, Portugal, June 2005.
  • P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Modeling Security Requirements Through Ownership, Permission and Delegation. In Proceedings of the 13th IEEE International Requirements Engineering Conference (RE'05), pages 167-176. IEEE Computer Society Press, 2005.
  • P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Filling the gap between Requirements Engineering and Public Key/Trust Management Infrastructures. In Proceedings of the 1st European PKI Workshop: Research and Applications (1st EuroPKI), LNCS 3093, pages 98-111. Springer-Verlag GmbH, 2004.
  • F. Massacci and N. Zannone. Privacy is Linking Permission to Purpose. In Proceedings of the Twelfth International Workshop on Security Protocols, 2004.
  • Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson: Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. 15th Int'l Conf., CAiSE 2003, Klagenfurt, Austria, June 16-18, 2003, Proceedings. LNCS 2681 (Springer) pp. 63-78
  • H. Mouratidis, P. Giorgini, M. Schumacher. Security Patterns for Agent Systems. In Proccedings of Eighth European Conference on Pattern Languages of Programs 25- 29, June 2003 Irsee, Germany.
  • P. Giorgini, F. Massacci, and J. Mylopoulos. Requirement Engineering meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard, in Proceedings of the 22nd International Conference on Conceptual Modeling, LNCS, Springer, 2003.
  • P. Bresciani, P. Giorgini, and H. Mouratidis On Security Requirements Analysis for Multi-Agent Systems. Proceedings of 2nd International Workshop on Software Engineering for Large- Scale Multi- Agent Systems SELMAS 2003 in conjunction with the 25th International Conference on Software Engineering (ICSE 2003), Portland, Oregon, USA, in May 3-4, 2003.
  • H. Mouratidis, P. Giorgini, and G. Manson. An Ontology for Modelling Security: The Tropos Approach. Proceedings of the KES 2003 Invited Session Ontology and Multi- Agent Systems Design (OMASD'03), 3, 4 & 5 September 2003, University of Oxford, United Kingdom.
  • H. Mouratidis, P. Giorgini, and M. Weiss Integrating Patterns and Agent-Oriented Methodologies to Provide Better Solutions for the Development of Secure Agent Systems. Proceedings of the Workshop on Expressiveness of Pattern Languages 2003, at ChiliPLoP 2003, March 11-14, 2003 Carefree, Arizona.
  • H. Mouratidis, P. Giorgini, G. Manson. Modelling Secure Multiagent Systems. In Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems, Melbourne, Australia, July 2003
  • H. Mouratidis, P. Giorgini, G. Manson, A. Gani. Analysing Security Requirements of Information Systems Using Tropos, (to appear) in the Proceedings of the 5th International Conference on Enterprise Information Systems, Angers - France, April 2003
  • H. Mouratidis, P. Giorgini, G. Manso and I. Philp. A Natural Extension of Tropos Methodology for Modelling Security. In Proceedings of the Workshop on Agent-oriented methodologies, at OOPSLA 2002, Seattle, WA, USA, Nov, 2002
  • Lin Liu, Eric Yu, John Mylopoulos: Security and Privacy Requirements Analysis within a Social Setting. in: IEEE Joint International Conference on Requirements Engineering 2003, California, USA. pp. 151-161.
  • Lin Liu, Eric Yu, John Mylopoulos: Analyzing Security Requirements As Relationships among Strategic Actors. in: 2nd Symposium on Requirements Engineering for Information Security (SREIS), 2002.
  • Golnaz Elahi, Eric Yu, A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs, Technical Report, University of Toronto, Department of Computer Science (2007)
Created by jenhork. Last Modification: Friday 08 of July, 2011 21:54:57 GMT-0000 by admin.