Secure tropos: a security-oriented extension of the tropos methodology
Although security plays an important role in the development of multiagent systems, a
careful analysis of software development processes shows that the definition of security …
careful analysis of software development processes shows that the definition of security …
A survey of trust in workflows and relevant contexts
With the fast-growing Internet technology, several service-based interactions are prevalent
and appear in several forms such as e-commerce, content provider, Virtual Organizations …
and appear in several forms such as e-commerce, content provider, Virtual Organizations …
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
Recent software development methodologies, as DevOps or Agile, are very popular and
widely used, especially for the development of cloud services and applications. They …
widely used, especially for the development of cloud services and applications. They …
[PDF][PDF] A survey on security patterns
Security has become an important topic for many software systems. Security patterns are
reusable solutions to security problems. Although many security patterns and techniques for …
reusable solutions to security problems. Although many security patterns and techniques for …
Comparison and evaluation of goal-oriented satisfaction analysis techniques
Goal-oriented requirements engineering (GORE) has been introduced as a means of
modeling and understanding the motivations for system requirements. Using models to …
modeling and understanding the motivations for system requirements. Using models to …
Modeling security requirements through ownership, permission and delegation
Security requirements engineering is emerging as a branch of software engineering,
spurred by the realization that security must be dealt with early on during the requirements …
spurred by the realization that security must be dealt with early on during the requirements …
[PDF][PDF] The tropos metamodel and its use
The Tropos Metamodel and its Use 1 Introduction 2 Models and Methodology Page 1 Informatica
29 (2005) 401–408 401 The Tropos Metamodel and its Use Angelo Susi, Anna Perini and John …
29 (2005) 401–408 401 The Tropos Metamodel and its Use Angelo Susi, Anna Perini and John …
Analyzing goal models: different approaches and how to choose among them
A great variety of techniques for analyzing goal models in requirements engineering have
been proposed in recent years. Approaches include propagating goal satisfaction values …
been proposed in recent years. Approaches include propagating goal satisfaction values …
Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation
Extending Requirements Engineering modelling and formal analysis methodologies to cope
with Security Requirements has been a major effort in the past decade. Yet, only few works …
with Security Requirements has been a major effort in the past decade. Yet, only few works …
Requirements engineering for trust management: model, methodology, and reasoning
A number of recent proposals aim to incorporate security engineering into mainstream
software engineering. Yet, capturing trust and security requirements at an organizational …
software engineering. Yet, capturing trust and security requirements at an organizational …