犬儒主义者 发表于 2025-3-23 10:34:44

http://reply.papertrans.cn/15/1458/145750/145750_11.png

预知 发表于 2025-3-23 14:23:05

https://doi.org/10.1057/9781137408266should comply with relevant laws and regulations. Legal issues should be incorporated into the system development process and there should be a systematic and structured assessment of a system’s trustworthiness to fulfil relevant legal obligations. This paper presents a novel meta-model, which combi

Offstage 发表于 2025-3-23 19:16:49

https://doi.org/10.1057/9781137408266able lack of security knowledge. Some security ontologies have been proposed, but a gap still exists between the two fields of security requirement engineering and ontologies. This paper is a survey, it proposes an analysis and a typology of existing security ontologies and their use for requirement

ethnology 发表于 2025-3-24 01:33:19

http://reply.papertrans.cn/15/1458/145750/145750_14.png

整理 发表于 2025-3-24 05:01:34

http://reply.papertrans.cn/15/1458/145750/145750_15.png

使出神 发表于 2025-3-24 10:01:10

http://reply.papertrans.cn/15/1458/145750/145750_16.png

难解 发表于 2025-3-24 10:53:01

http://reply.papertrans.cn/15/1458/145750/145750_17.png

宴会 发表于 2025-3-24 15:38:37

http://reply.papertrans.cn/15/1458/145750/145750_18.png

大方不好 发表于 2025-3-24 20:23:23

https://doi.org/10.1057/9781137408266nes legal and trust related concepts, to enable information systems developers to model and reason about the trustworthiness of a system in terms of its law compliance. A case study is used to demonstrate the applicability and benefits of the proposed meta-model.

Terminal 发表于 2025-3-25 00:45:40

https://doi.org/10.1057/9781137408266s. The extension is generic and can be applied to a wide variety of UML elements. In a model-driven development (MDD) approach, our extension can be used to generate corresponding audit rules via model transformations.
页: 1 [2] 3 4
查看完整版本: Titlebook: Advanced Information Systems Engineering Workshops; CAiSE 2012 Internati Marko Bajec,Johann Eder Conference proceedings 2012 Springer-Verla