Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Proceedings of the First International Workshop on Multi-Agent Systems and Agent-Based Simulation
On Personal and Role Mental Attitudes: A Preliminary Dependence-Based Analysis
SBIA '98 Proceedings of the 14th Brazilian Symposium on Artificial Intelligence: Advances in Artificial Intelligence
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Using Abuse Case Models for Security Requirements Analysis
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Principles of Trust for MAS: Cognitive Anatomy, Social Importance, and Quantification
ICMAS '98 Proceedings of the 3rd International Conference on Multi Agent Systems
The CORAS methodology: model-based risk assessment using UML and UP
UML and the unified process
Tropos: An Agent-Oriented Software Development Methodology
Autonomous Agents and Multi-Agent Systems
Using uml to visualize role-based access control constraints
Proceedings of the ninth ACM symposium on Access control models and technologies
Monitoring and Organizational-Level Adaptation of Multi-Agent Systems
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2
MAC and UML for secure software design
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Monitoring teams by overhearing: a multi-agent plan-recognition approach
Journal of Artificial Intelligence Research
Computer Standards & Interfaces
Secure Systems Development with UML
Secure Systems Development with UML
Computer-aided Support for Secure Tropos
Automated Software Engineering
CAiSE '08 Proceedings of the 20th international conference on Advanced Information Systems Engineering
From early to late requirements: a goal-based approach
AOIS'06 Proceedings of the 8th international Bi conference on Agent-oriented information systems IV
Comparing three formal analysis approaches of the tropos family
AOIS'06 Proceedings of the 8th international Bi conference on Agent-oriented information systems IV
Towards interoperability of i* models using iStarML
Computer Standards & Interfaces
Designing security requirements models through planning
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
Security and trust requirements engineering
Foundations of Security Analysis and Design III
Hi-index | 0.00 |
When we model and analyze trust in organizations or information systems we have to take into account two different levels of analysis: social and individual. Social levels define the structure of organizations, whereas individual levels focus on individual agents. This is particularly important when capturing security requirements where a “normally” trusted organizational role can be played by an untrusted individual. Our goal is to model and analyze the two levels finding the link between them and supporting the automatic detection of conflicts that can come up when agents play roles in the organization. We also propose a formal framework that allows for the automatic verification of security requirements between the two levels by using Datalog and has been implemented in CASE tool.