Sciweavers

626 search results - page 1 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
ICEIS
2003
IEEE
13 years 10 months ago
Analysing Security Requirements of Information Systems Using Tropos
Haralambos Mouratidis, Gordon A. Manson, Abdullah ...
CAISE
2009
Springer
13 years 11 months ago
A Goal Modeling Framework for Self-contextualizable Software
Self-contextualizability refers to the system ability to autonomously adapt its behaviour to context in order to maintain its objectives satisfied. In this paper, we propose a mod...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
ASE
2008
120views more  ASE 2008»
13 years 5 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
RE
2007
Springer
13 years 11 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
CAISE
2009
Springer
13 years 11 months ago
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the S...
Haralambos Mouratidis, Ali Sunyaev, Jan Jürje...