Reusability in goal modeling: A systematic literature review

MB Duran, G Mussbacher - Information and Software Technology, 2019 - Elsevier
Context: Goal modeling is an important instrument for the elicitation, specification, analysis,
and validation of early requirements. Goal models capture hierarchical representations of …

Challenges in engineering self-adaptive authorisation infrastructures

L Montrieux, R de Lemos, C Bailey - Engineering Adaptive Software …, 2019 - Springer
As organisations expand and interconnect, authorisation infrastructures become
increasingly difficult to manage. Several solutions have been proposed, including self …

A new approach to deploy a self-adaptive distributed firewall

EP da Costa Júnior, CE da Silva, M Pinheiro… - Journal of Internet …, 2018 - Springer
Distributed firewall systems emerged with the proposal of protecting individual hosts against
attacks originating from inside the network. In these systems, firewall rules are centrally …

Self-adaptive authorisation in OpenStack cloud platform

CE Da Silva, T Diniz, N Cacho, R Lemos - Journal of Internet Services and …, 2018 - Springer
Although major advances have been made in protection of cloud platforms against
malicious attacks, little has been done regarding the protection of these platforms against …

Requirements-driven mediation for collaborative security

A Bennaceur, AK Bandara, M Jackson, W Liu… - Proceedings of the 9th …, 2014 - dl.acm.org
Security is concerned with the protection of assets from intentional harm. Secure systems
provide capabilities that enable such protection to satisfy some security requirements. In a …

[图书][B] Self-adaptive Authorisation Infrastructures

CM Bailey - 2015 - search.proquest.com
Traditional approaches in access control rely on immutable criteria in which to decide and
award access. These approaches are limited, notably when handling changes in an …

Modeling adaptive access control policies using answer set programming

S Sartoli, AS Namin - Journal of information security and applications, 2019 - Elsevier
Many of the existing management platforms such as pervasive computing systems
implement policies that depend on dynamic operational environment changes. Existing …

Conflicts between security and privacy measures in software requirements engineering

D Ganji, H Mouratidis, SM Gheytassi… - Global Security, Safety …, 2015 - Springer
The digital world is expanding rapidly into all parts of the physical world and our
environment is shaped by the technologies we use. Majority of these technologies are user …

Recovering security in model-based software engineering by context-driven co-evolution

J Bürger - 2019 - kola.opus.hbz-nrw.de
Software systems have an increasing impact on our daily lives. Many systems process
sensitive data or control critical infrastructure. Providing secure software is therefore …

A game-theoretic decision-making framework for engineering self-protecting software systems

M Emami-Taba - … IEEE/ACM 39th International Conference on …, 2017 - ieeexplore.ieee.org
Targeted and destructive nature of strategies used by attackers to break down the system
require mitigation approaches with dynamic awareness. Making a right decision, when …