Sciweavers

902 search results - page 2 / 181
» Security and Trust Requirements Engineering
Sort
View
RE
2004
Springer
13 years 11 months ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
EUROPKI
2004
Springer
13 years 11 months ago
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
The last years have seen a major interest in designing and deploying trust management and public key infrastructures. Yet, it is still far from clear how one can pass from the orga...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
ITRUST
2005
Springer
13 years 11 months ago
Modeling Social and Individual Trust in Requirements Engineering Methodologies
Abstract. When we model and analyze trust in organizations or information systems we have to take into account two different levels of analysis: social and individual. Social leve...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
ITRUST
2005
Springer
13 years 11 months ago
ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements
ST-Tool is a graphical tool integrating an agent-oriented requirements engineering methodology with tools for the formal analysis of models. Essentially, the tool allows designers ...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, A...
IFIPTM
2010
145views Management» more  IFIPTM 2010»
13 years 4 months ago
A Formal Notion of Trust - Enabling Reasoning about Security Properties
Historically, various different notions of trust can be found, each addressing particular aspects of ICT systems, e.g. trust in electronic commerce systems based on reputation and...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...