Secure tropos: a security-oriented extension of the tropos methodology

H Mouratidis, P Giorgini - International Journal of Software …, 2007 - World Scientific
Although security plays an important role in the development of multiagent systems, a
careful analysis of software development processes shows that the definition of security …

A survey of trust in workflows and relevant contexts

W Viriyasitavat, A Martin - IEEE Communications Surveys & …, 2011 - ieeexplore.ieee.org
With the fast-growing Internet technology, several service-based interactions are prevalent
and appear in several forms such as e-commerce, content provider, Virtual Organizations …

A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach

V Casola, A De Benedictis, M Rak, U Villano - Journal of Systems and …, 2020 - Elsevier
Recent software development methodologies, as DevOps or Agile, are very popular and
widely used, especially for the development of cloud services and applications. They …

[PDF][PDF] A survey on security patterns

N Yoshioka, H Washizaki, K Maruyama - Progress in informatics, 2008 - academia.edu
Security has become an important topic for many software systems. Security patterns are
reusable solutions to security problems. Although many security patterns and techniques for …

Comparison and evaluation of goal-oriented satisfaction analysis techniques

J Horkoff, E Yu - Requirements Engineering, 2013 - Springer
Goal-oriented requirements engineering (GORE) has been introduced as a means of
modeling and understanding the motivations for system requirements. Using models to …

Modeling security requirements through ownership, permission and delegation

P Giorgini, F Massacci, J Mylopoulos… - … Engineering (RE'05), 2005 - ieeexplore.ieee.org
Security requirements engineering is emerging as a branch of software engineering,
spurred by the realization that security must be dealt with early on during the requirements …

Analyzing goal models: different approaches and how to choose among them

J Horkoff, E Yu - Proceedings of the 2011 ACM Symposium on Applied …, 2011 - dl.acm.org
A great variety of techniques for analyzing goal models in requirements engineering have
been proposed in recent years. Approaches include propagating goal satisfaction values …

[PDF][PDF] The tropos metamodel and its use

A Susi, A Perini, J Mylopoulos, P Gi - Informatica, 2005 - informatica.si
The Tropos Metamodel and its Use 1 Introduction 2 Models and Methodology Page 1 Informatica
29 (2005) 401–408 401 The Tropos Metamodel and its Use Angelo Susi, Anna Perini and John …

Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation

F Massacci, M Prest, N Zannone - Computer Standards & Interfaces, 2005 - Elsevier
Extending Requirements Engineering modelling and formal analysis methodologies to cope
with Security Requirements has been a major effort in the past decade. Yet, only few works …

[HTML][HTML] Capturing security requirements for software systems

H El-Hadary, S El-Kassas - Journal of advanced research, 2014 - Elsevier
Security is often an afterthought during software development. Realizing security early,
especially in the requirement phase, is important so that security problems can be tackled …