Reusability in goal modeling: A systematic literature review
MB Duran, G Mussbacher - Information and Software Technology, 2019 - Elsevier
Context: Goal modeling is an important instrument for the elicitation, specification, analysis,
and validation of early requirements. Goal models capture hierarchical representations of …
and validation of early requirements. Goal models capture hierarchical representations of …
Challenges in engineering self-adaptive authorisation infrastructures
L Montrieux, R de Lemos, C Bailey - Engineering Adaptive Software …, 2019 - Springer
As organisations expand and interconnect, authorisation infrastructures become
increasingly difficult to manage. Several solutions have been proposed, including self …
increasingly difficult to manage. Several solutions have been proposed, including self …
A new approach to deploy a self-adaptive distributed firewall
EP da Costa Júnior, CE da Silva, M Pinheiro… - Journal of Internet …, 2018 - Springer
Distributed firewall systems emerged with the proposal of protecting individual hosts against
attacks originating from inside the network. In these systems, firewall rules are centrally …
attacks originating from inside the network. In these systems, firewall rules are centrally …
Self-adaptive authorisation in OpenStack cloud platform
Although major advances have been made in protection of cloud platforms against
malicious attacks, little has been done regarding the protection of these platforms against …
malicious attacks, little has been done regarding the protection of these platforms against …
Requirements-driven mediation for collaborative security
A Bennaceur, AK Bandara, M Jackson, W Liu… - Proceedings of the 9th …, 2014 - dl.acm.org
Security is concerned with the protection of assets from intentional harm. Secure systems
provide capabilities that enable such protection to satisfy some security requirements. In a …
provide capabilities that enable such protection to satisfy some security requirements. In a …
[图书][B] Self-adaptive Authorisation Infrastructures
CM Bailey - 2015 - search.proquest.com
Traditional approaches in access control rely on immutable criteria in which to decide and
award access. These approaches are limited, notably when handling changes in an …
award access. These approaches are limited, notably when handling changes in an …
Modeling adaptive access control policies using answer set programming
Many of the existing management platforms such as pervasive computing systems
implement policies that depend on dynamic operational environment changes. Existing …
implement policies that depend on dynamic operational environment changes. Existing …
Conflicts between security and privacy measures in software requirements engineering
D Ganji, H Mouratidis, SM Gheytassi… - Global Security, Safety …, 2015 - Springer
The digital world is expanding rapidly into all parts of the physical world and our
environment is shaped by the technologies we use. Majority of these technologies are user …
environment is shaped by the technologies we use. Majority of these technologies are user …
Recovering security in model-based software engineering by context-driven co-evolution
J Bürger - 2019 - kola.opus.hbz-nrw.de
Software systems have an increasing impact on our daily lives. Many systems process
sensitive data or control critical infrastructure. Providing secure software is therefore …
sensitive data or control critical infrastructure. Providing secure software is therefore …
A game-theoretic decision-making framework for engineering self-protecting software systems
M Emami-Taba - … IEEE/ACM 39th International Conference on …, 2017 - ieeexplore.ieee.org
Targeted and destructive nature of strategies used by attackers to break down the system
require mitigation approaches with dynamic awareness. Making a right decision, when …
require mitigation approaches with dynamic awareness. Making a right decision, when …