Online ISSN:1349-8606
Progress in Informatics  
No5. March 2008  
Page 7-18  
 
PORTAM:Policy, requirements, and threats analyzer for mobile code applications
Haruhiko KAIYA Kouta SASAKI and Kenji KAIJIRI

LINK [1] B. Boehm, P. Grunbacher, and R.O. Briggs, “Developing Groupware for Requirements Negotiation: Lessons Learned.” IEEE Software,vol. 8, no. 3, pp.46-55, May/Jun. 2001.

LINK [2] T.D. Breaux and A.I. Anton, “Analyzing Goal Semantics for Rights, Permissions,and Obligations.” In 13th IEEE International Conference on Requirements Engineering (RE'05), pp.177-188, 2005.

LINK [3]T.Cohene and S. Easterbrook, “Contextual Risk Analysis for Interview Design.” In 13th IEEE International Conference on Requirements Engineering (RE'05), pp.95-104, 2005.

LINK [4] S.L. Cornford, M.S. Feather, J.C. Kelly, T.W. Larson, B. Sigal, and J.D. Kiper,“Design and Development Assessment.” In Proceedings of the Tenth International Workshop on Software Specification and Design (IWSSD'00), pp.105-114, 2000.

LINK [5] C. Coulin and D. Zowghi, “GONDOLA: An Interactive Computer Game-Based Teaching and Learning Environment for Requirements Engineering.” In REFSQ'04, pp.113-126, 2004.

LINK [6]R.Crook, D. Ince, L. Lin, and B. Nuseibeh, “Security Requirements Engineering: When Anti-requirements Hit the Fan.” In IEEE Joint International Requirements Engineering Conference, RE'02,Essen, Germany, pp.203-205, Sep. 2002.

LINK [7] R. Crook, D. Ince, and B. Nuseibeh, “On Modelling Access Policies: Relating Roles to their Organisational Context.” In 13th IEEE International Conference on Requirements Engineering (RE'05), pp.157-166, 2005.

LINK [8] X. Franch and J. Pablo Carvallo, “Using Quality Models in Software Package Selection.” Software,vol. 20, no. 1, pp.34-33, Jan./Feb. 2003.

LINK [9] P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, “Modeling Security Requirements Through Ownership, Permission and Delegation.” In 13th IEEE International Conference on Requirements Engineering (RE'05), pp.167-176, 2005.

LINK [10] G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, and R. Lutz, “A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. Requirements Engineering,vol. 7, no. 4, pp.207-220, Dec. 2002.

LINK [11] H. Kaiya, K. Sasaki, and K. Kaijiri. A Method to Develop Feasible Requirements for Java Mobile Code Application. IEICE Trans. Inf. and Syst.,E87-D(4):811-821, Apr. 2004.

LINK [12] H. Kaiya, K. Sasaki, Y. Maebashi, and K. Kaijiri, “Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application.” In 11th IEEE International Requirements Engineering Conference,Monterey Bay, California, pp.357-358, Sep. 2003.

LINK [13] K. Kato and Y. Oyama, “SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation.” Lecture Notes in Computer Science,vol. 2609, pp.112-132,2003.

LINK [14] S. Lauesen, “COTS Tenders and Integration Requirements.” In 12th IEEE International Requirements Engineering Conference (RE'04), pp.166-175, 2004.

LINK [15] M.C. Robinson, S.E. Wallace, and D.C. Woodward, “Risk Mitigation of Design Requirements Using a Probabilistic Analysis.” In 13th IEEE International Conference on Requirements Engineering (RE'05), pp.231-239, 2005.

LINK [16] G. Sindre and A.L. Opdahl, “Eliciting security requirements with misuse cases.” Requirements Engineering, vol. 10, no. 1, pp.34-44, Jan. 2005.

LINK [17] Sun Microsystems, Inc. Java Security Architecture (JDK1.2),Oct. 1998. Version 1.0.

LINK [18] A. van Lamsweerde. “Elaborating Security Requirements by Construction of Intentional Anti-Models.” In Proceedings of ICSE'04, 26th International Conference on Software Engineering,Edinburgh, pp.148-157, May 2004.

LINK [19] C. Wohlin, P. Runeson, M. Host, M.C. Ohlsson, B. Regnell, and A. Wesslen, Experimentation in Software Engineering An Introduction.Kluwer, 2000.

LINK [20] D. Zowghi and S. Paryani. “Teaching Requirements Engineering through Role Playing: Lessons Learnt.” In 12th IEEE International Requirements Engineering Conference (RE'04), pp.233-241, 2004.