• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Modeling Security Requirements through Ownership, Permission and Delegation (2005)

Cached

  • Download as a PDF

Download Links

  • [www.troposproject.org]
  • [eprints.biblio.unitn.it]
  • [disi.unitn.it]
  • [disi.unitn.it]
  • [dit.unitn.it]
  • [security1.win.tue.nl]
  • [sesa.dit.unitn.it]
  • [security1.win.tue.nl]
  • [www.dit.unitn.it]
  • [klase.fbk.eu]
  • [disi.unitn.it]
  • [disi.unitn.it]

  • Other Repositories/Bibliography

  • CiteULike
  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Paolo Giorgini , Fabio Massacci , John Mylopoulos
Venue:In Proc. of RE’05
Citations:97 - 32 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Giorgini05modelingsecurity,
    author = {Paolo Giorgini and Fabio Massacci and John Mylopoulos},
    title = {Modeling Security Requirements through Ownership, Permission and Delegation},
    booktitle = {In Proc. of RE’05},
    year = {2005},
    pages = {167--176},
    publisher = {IEEE Press}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements phase. Methodologies in this field are challenging, as they must take into account subtle notions such as trust (or lack thereof), delegation, and permission; they must also model entire organizations and not only systems-to-be.

Keyphrases

security requirement    software engineering    requirement phase    security requirement engineering    entire organization    account subtle notion   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University