User Tools

Site Tools


security_requirements_engineering

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
security_requirements_engineering [2013/04/04 15:50]
leminhsang.tran@unitn.it [Software]
security_requirements_engineering [2021/01/29 10:58] (current)
Line 65: Line 65:
  
 ==== 2013 ==== ==== 2013 ====
- +  * Tran L.M.S and Massacci F.: UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolutions. In: //CAiSE 2013 - Forum// {{:​research_activities:​security_requirements_engineering:​tran-caiseforum13.pdf|PDF}} {{:​research_activities:​security_requirements_engineering:​poster-tran-massacci-caiseforum.pdf|Poster}} 
-  * Tran L.M.S.: Early Dealing with Evolving Risks in Software Systems. In: //The 3rd International Workshop on Information Systems Security Engineering (WISSE'​13)//,​ co-located with CAiSE 2013. {{:​research_activities:​security_requirements_engineering:​tran-wisse13.pdf|PDF}}+  * Tran L.M.S.: Early Dealing with Evolving Risks in Software Systems. In: //The 3rd International Workshop on Information Systems Security Engineering (WISSE'​13)//,​ co-located with CAiSE 2013, 17-21 June 2013, Valencia, Spain. {{:​research_activities:​security_requirements_engineering:​tran-wisse13.pdf|PDF}}
    
 ==== 2012 ==== ==== 2012 ====
Line 95: Line 95:
   * P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proc. of IEEE RE'06. pages 315-318. IEEE Press, 2006.   * P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proc. of IEEE RE'06. pages 315-318. IEEE Press, 2006.
   * Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation"​. //Computer Standards & Interfaces//,​ 2005, v. 27, n. 5, p. 445-455. {{:​research_activities:​security_requirements_engineering:​mass-pres-zann-05-csi.pdf|PDF}}. One of our earliest papers and the most cited journal one.   * Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation"​. //Computer Standards & Interfaces//,​ 2005, v. 27, n. 5, p. 445-455. {{:​research_activities:​security_requirements_engineering:​mass-pres-zann-05-csi.pdf|PDF}}. One of our earliest papers and the most cited journal one.
-  * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of IEEE RE'05, IEEE Press 2005. The most cited paper of the conference.+  ​* //**P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of IEEE RE'05, IEEE Press 2005. (Ten Years Most Influential Paper IEEE RE 2015). {{:​research_activities:​security_requirements_engineering:​gior-mass-mylo-zann-05-rea.pdf|PDF}}**//​
   * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'​05 LNCS Springer 2005. PDF   * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'​05 LNCS Springer 2005. PDF
  
Line 105: Line 105:
 ===== Software ===== ===== Software =====
  
-  *UNICORN: a tool for modeling and reasoning on the uncertainty of requirements evolutions. ​ This is an Eclipse-based tool that aims to supports the modeling and reasoning on the uncertainty of requirements evolution. The tool provides graphical constructs as well as different views of requirements evolution to assist users to model requirements evolution. The reasoning facilitates the selection of design alternatives.+  *[[http://​disi.unitn.it/​~tran/​pmwiki/​pmwiki.php/​Main/​Unicorn|UNICORN ​]]: a tool for modeling and reasoning on the uncertainty of requirements evolutions. ​ This is an Eclipse-based tool that aims to supports the modeling and reasoning on the uncertainty of requirements evolution. The tool provides graphical constructs as well as different views of requirements evolution to assist users to model requirements evolution. The reasoning facilitates the selection of design alternatives.
  
   *A very old tool that we used in the first papers is here. http://​sesa.dit.unitn.it/​sistar_tool ​   *A very old tool that we used in the first papers is here. http://​sesa.dit.unitn.it/​sistar_tool ​
security_requirements_engineering.1365083442.txt.gz · Last modified: 2021/01/29 10:58 (external edit)