From object-oriented to goal-oriented requirements analysis
Communications of the ACM
Integrated process modeling: an ontological evaluation
Information Systems - The 11th international conference on advanced information systems engineering (CAiSE*
Goal-Oriented Requirements Engineering: A Guided Tour
RE '01 Proceedings of the Fifth IEEE International Symposium on Requirements Engineering
Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors
IEEE Security and Privacy
Evaluating the Effectiveness of a Goal-Oriented Requirements Engineering Method
CERE '06 Proceedings of the Fourth Internationa Workshop on Comparative Evaluation in Requirements Engineering
Model-based security analysis in seven steps --- a guided tour to the CORAS method
BT Technology Journal
Candidate interoperability standards: An ontological overlap analysis
Data & Knowledge Engineering
Conceptual Modeling: Foundations and Applications
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
ACM Transactions on Information and System Security (TISSEC)
Requirements Engineering - Special Issue on RE'09: Security Requirements Engineering; Guest Editors: Eric Dubois and Haralambos Mouratidis
HICSS '10 Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
Hi-index | 0.00 |
Goal-oriented requirements engineering can facilitate the elicitation and representation of various types of requirements, including organizational and security requirements. This paper applies the Bunge-Wand-Weber ontological model to analyze and evaluate the security concepts in the extended i* modeling language that has been considered as one of representative methods concerning goal-oriented modeling languages. The findings revealed that among the seventeen terms analyzed, thirteen concepts can be directly mapped to ontological terms. The findings can help in future works develop modeling rules to assist security requirements engineering.