ECAI '92 Proceedings of the 10th European conference on Artificial intelligence
Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Fast planning through planning graph analysis
Artificial Intelligence
ConGolog, a concurrent programming language based on the situation calculus
Artificial Intelligence
A Deductive Approach to Program Synthesis
ACM Transactions on Programming Languages and Systems (TOPLAS)
Towards requirements-driven information systems engineering: the Tropos project
Information Systems - The 13th international conference on advanced information systems engineering (CAiSE*01)
Modelling Trust for System Design Using the i* Strategic Actors Framework
Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives
Using Abuse Case Models for Security Requirements Analysis
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Moving proofs-as-programs into practice
ASE '97 Proceedings of the 12th international conference on Automated software engineering (formerly: KBSE)
Reasoning about partial goal satisfaction for requirements and design engineering
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
Eliciting security requirements with misuse cases
Requirements Engineering
Modeling Security Requirements Through Ownership, Permission and Delegation
RE '05 Proceedings of the 13th IEEE International Conference on Requirements Engineering
Using trust assumptions with security requirements
Requirements Engineering
Computer Standards & Interfaces
Modeling social and individual trust in requirements engineering methodologies
iTrust'05 Proceedings of the Third international conference on Trust Management
Computational Logic in Multi-Agent Systems
Supporting Requirements Analysis in Tropos: A Planning-Based Approach
Agent Computing and Multi-Agent Systems
Using risk analysis to evaluate design alternatives
AOSE'06 Proceedings of the 7th international conference on Agent-oriented software engineering VII
Comparing three formal analysis approaches of the tropos family
AOIS'06 Proceedings of the 8th international Bi conference on Agent-oriented information systems IV
Analyzing goal models: different approaches and how to choose among them
Proceedings of the 2011 ACM Symposium on Applied Computing
Autonomous Agents and Multi-Agent Systems
Connecting security requirements analysis and secure design using patterns and UMLsec
CAiSE'11 Proceedings of the 23rd international conference on Advanced information systems engineering
Designing cooperative IS: exploring and evaluating alternatives
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part I
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
A goal-oriented approach for the generation and evaluation of alternative architectures
ECSA'07 Proceedings of the First European conference on Software Architecture
PWWM: a personal web workflow methodology
The Personal Web
Hi-index | 0.01 |
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mechanisms for requirements and software verification are by now a well-accepted part of the design process, and model driven architectures support the automation of the refinement process. We claim that we can further push the envelope towards the automatic exploration and selection among design alternatives and show that this is concretely possible for Secure Tropos, a requirements engineering methodology that addresses security and trust concerns. In Secure Tropos, a design consists of a network of actors (agents, positions or roles) with delegation/permission dependencies among them. Accordingly, the generation of design alternatives can be accomplished by a planner which is given as input a set of actors and goals and generates alternative multi-agent plans to fulfill all given goals. We validate our claim with a case study using a state-of-the-art planner.