L. Chung, B. Nixon, “Dealing with Non-Functional Requirements: Three Experimental Studies of a Process-Oriented Approach”, Proceedings of the 17th International Conference on Software Engineering, Seattle-USA, 1995
I. Sommerville, “Software Engineering”, sixth edition, Addison-Wesley, 2001
E. Yu, L. Cysneiros, “Designing for Privacy and Other Competing Requirements”, 2nd Symposium on Requirements Engineering for Information Security (SREIS’ 02), Raleigh, North Carolina, 15–16 November, 2002
A. Dardenne, A. Van Lamsweerde, S. Fickas, “Goal-directed Requirements Acquisition. Science of Computer Programming”, Special issue on 6
Int. Workshop of Software Specification and Design, 1991.
B. Lampson, “Computer Security in the real world”, Annual Computer Security Applications Conference 2000.
J. McDermott, C. Fox, “Using Abuse Care Models for Security Requirements Analysis”, Proceedings of the 15th Annual Computer Security Applications Conference, December 1999.
R. Anderson, “Security Engineering: A Guide to Building Dependable Distributed Systems”, Wiley Computer Publishing, 2001
W. Stallings, “Cryptography and Network Security: Principles and Practice”, Second Edition, Prentice-Hall 1999.
T. Tryfonas, E. Kiountouzis, A. Poulymenakou. “Embedding security practices in contemporary information systems development approaches”, Information Management & Computer Security, Vol 9 Issue 4, 2001, pp 183–197CrossRefGoogle Scholar
J. Castro, M. Kolp and J. Mylopoulos. “A Requirements-Driven Development Methodology,” In Proc. of the 13th Int. Conf. On Advanced Information Systems Engineering (CAiSE’01), Interlaken, Switzerland, June 2001.
A. Perini, P. Bresciani, P. Giorgini, F. Giunchiglia, J. Mylopoulos. “Towards an Agent Oriented Approach to Software Engineering. In A. Omicini and M. Viroli, editors, WOA 2001 — Dagli oggetti agli agenti: tendenze evolutive dei sistemi software, Modena-Italy, September 2001.
P. Bresciani and P. Giorgini. “The Tropos Analysis Process as Graph Transformation System”. In Proceedings of the Workshop on Agent-oriented methodologies, at OOPSLA 2002, Seattle, WA, USA, Nov, 2002.
E. Yu, “Modelling Strategic Relationships for Process Reengineering”, PhD thesis, Department of Computer Science, University of Toronto, Canada, 1995.Google Scholar
H. Mouratidis, P. Giorgini, G. Manson, I. Philp, “A Natural Extension of Tropos Methodology for Modelling Security”, In the Proceedings of the Agent Oriented Methodologies Workshop (OOPSLA 2002), Seattle-USA, November 2002.
B. Bauer, J. Müller, J. Odell, “Agent UML: A Formalism for Specifying Multiagent Interaction”. In Agent-Oriented Software Engineering
, Paolo Ciancarini and Michael Wooldridge (eds), Springer, Berlin, pp. 91–103, 2001.CrossRefGoogle Scholar
H. Mouratidis, i. Philp, G. Manson, “Analysis and Design of eSAP: An Integrated Health and Social Care Information System”, in the Proceedings of the 7th International Symposium on Health Information Managements Research (ISHIMR2002), Sheffield, June 2002
M. Garzetti, P. Giorgini, J. Mylopoulos, F. Sannicolo, “Applying Tropos Methodology to a real case study: Complexity and Criticality Analysis”, in the Proceedings of the Second Italian workshop on “WOA 2002 dagli oggetti agli agenti dall’informazione alla conoscenza”, Milano, 18–19 November 2002
P. Giorgini, J. Mylopoulos, E. Nicchiarelli, R. Sebastiani. “Reasoning with Goal Models”, in the Proceedings of the 21st International Conference on Conceptual Modeling (ER2002), Tampere, Finland, October 2002.
L. Bass, P. Clements, R. Kazman, “Software Architecture in Practice”, SEI Series in Software Engineering, Addison-Wesley, 1998.
J. Bosch, “Design and Use of Software Architectures: adopting and evolving a product-line approach”, ACM Press, Addison-Wesley, 2000.
R. T. Fielding, “Architectural Styles and the Design of Network-based Software Architectures”, Doctoral dissertation, University of California, Irvine, 2000Google Scholar
A. Puliafito, S. Riccobene, M. Scarpa, “Which paradigm should I use?: An analytical comparison of the client-server, remote evaluation and mobile agents paradigms”, IEEE Concurrency and Computation: Practice & Experience
, vol. 13, pp. 71–94, 2001.MATHCrossRefGoogle Scholar
Kotz, D.; Mattern, F. (Eds.): Agent Systems, Mobile Agents, and Applications. Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents, ASA/MA 2000, pp. 57–72. LNCS 1882, Springer-Verlag, 2000
R. Kazman, G. Abowd, L. Bass, M. Webb, “SAAM: A Method for Analyzing the Properties of Software Architectures”, Proceedings of ICSE-16, Sorrento — Italy, May, 1994.
H. Mouratidis, P. Giorgini, G. Manson, I. Philp, “Using Tropos Methodology to Model an Integrated Health Assessment System”, Proceedings of the 4th International Bi-Conference Workshop on Agent-Oriented Information Systems (AOIS-2002), Toronto-Ontario, May 2002
C. Meadows, “A Model of Computation for the NRL protocol analyser”, Proceedings of the 1994 Computer Security Foundations Workshop, 1994.
S. Rohrig, “Using Process Models to Analyze Health Care Security Requirements”, International Conference Advances in Infrastructure for e-Business, e-Education, e-Science, and e-Medicine on the Internet, January 2002, L’Aquila, Italy
L. Liu, E. Yu, J. Mylopoulos, “Analysing Security Requirements as Relationships Among Strategic Actors”, 2nd Symposium on Requirements Engineering for Information Security (SREIS’02). Raleigh, North Carolina, October 16, 2002.
Dardenne, A. van Lamsweerde, S. Fickas, “Goal-directed Requirements Acquisition. Science of Computer Programming”, Special issue on 6
Int. Workshop of Software Specification and Design, 1991.
Jan Jürjens, “Towards Secure Systems Development with UMLsec”, Fundamental Approaches to Software Engineering (FASE/ETAPS) 2001, International Conference, Genoa 4–6 April 2001
T. Lodderstedt, D. Basin, J. Doser, “SecureUML: A UML-Based Modelling Language for Model-Driven Security”, in the Proceedings of the 5th International Conference on the Unified Modeling Language, 2002.
S. Guttorm, A. L. Opdahl, “Eliciting Security Requirements by Misuse Cases”, Proceedings of TOOLS Pacific 2000, November 2000.
A. Fuxman, M. Pistore, J. Mylopoulos, P. Traverso, “Model Checking Early Requirements Specification in Tropos”, Proceedings of the 5th Int. Symposium on Requirements Engineering, RE’ 01, Toronto, Canada, August 2001