1 resultado para secure routing
em Research Open Access Repository of the University of East London.
Filtro por publicador
- JISC Information Environment Repository (1)
- Repository Napier (3)
- University of Cagliari UniCA Eprints (1)
- Abertay Research Collections - Abertay University’s repository (5)
- Academic Archive On-line (Jönköping University; Sweden) (2)
- Academic Archive On-line (Karlstad University; Sweden) (1)
- AMS Campus - Alm@DL - Università di Bologna (1)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (10)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (15)
- ArchiMeD - Elektronische Publikationen der Universität Mainz - Alemanha (2)
- Archive of European Integration (2)
- Aston University Research Archive (12)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (2)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (2)
- Biodiversity Heritage Library, United States (1)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (36)
- Boston University Digital Common (17)
- Bucknell University Digital Commons - Pensilvania - USA (1)
- Bulgarian Digital Mathematics Library at IMI-BAS (4)
- CaltechTHESIS (1)
- Cambridge University Engineering Department Publications Database (33)
- CentAUR: Central Archive University of Reading - UK (23)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (13)
- Cochin University of Science & Technology (CUSAT), India (13)
- Coffee Science - Universidade Federal de Lavras (1)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (2)
- CORA - Cork Open Research Archive - University College Cork - Ireland (1)
- Dalarna University College Electronic Archive (1)
- Department of Computer Science E-Repository - King's College London, Strand, London (5)
- Digital Commons at Florida International University (9)
- Digital Peer Publishing (2)
- DigitalCommons@University of Nebraska - Lincoln (7)
- DRUM (Digital Repository at the University of Maryland) (3)
- Duke University (3)
- FUNDAJ - Fundação Joaquim Nabuco (1)
- Glasgow Theses Service (2)
- Greenwich Academic Literature Archive - UK (7)
- Harvard University (2)
- Helda - Digital Repository of University of Helsinki (3)
- Illinois Digital Environment for Access to Learning and Scholarship Repository (1)
- Indian Institute of Science - Bangalore - Índia (50)
- Instituto Politécnico do Porto, Portugal (3)
- Iowa Publications Online (IPO) - State Library, State of Iowa (Iowa), United States (2)
- Massachusetts Institute of Technology (3)
- Memorial University Research Repository (1)
- National Center for Biotechnology Information - NCBI (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (54)
- Queensland University of Technology - ePrints Archive (359)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (1)
- Repositório Institucional da Universidade de Aveiro - Portugal (8)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (9)
- Research Open Access Repository of the University of East London. (1)
- School of Medicine, Washington University, United States (2)
- SerWisS - Server für Wissenschaftliche Schriften der Fachhochschule Hannover (1)
- South Carolina State Documents Depository (1)
- Universidad de Alicante (3)
- Universidad del Rosario, Colombia (1)
- Universidad Politécnica de Madrid (24)
- Universidade Complutense de Madrid (1)
- Universitat de Girona, Spain (12)
- Université de Montréal (1)
- Université de Montréal, Canada (8)
- University of Canberra Research Repository - Australia (2)
- University of Michigan (26)
- University of Queensland eSpace - Australia (13)
- University of Southampton, United Kingdom (2)
- University of Washington (1)
- WestminsterResearch - UK (3)
Resumo:
Although security plays an important role in the development of multiagent systems, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. One of the reasons is the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing stages. The integration of security concerns during the whole range of the development stages can help towards the development of more secure multiagent systems. In this paper we introduce extensions to the Tropos methodology to enable it to model security concerns throughout the whole development process. A description of the new concepts and modelling activities is given along with a discussion on how these concepts and modelling activities are integrated to the current stages of Tropos. A real life case study from the health and social care sector is used to illustrate the approach.