Schneier,B.Beyond Fear,Thinking Sensibly About Security in an Uncertain World[M].Copernicus Books,2003.
[2]
Chung L,Nixon B A,Yu E,Mylopoulos J.Non-Functional Requirements in Software Engineering[M].Kluwer Academic Publishers,2000.
[3]
R Falcone,M Singh,Y H Tan,et al.Trust in Cybor-Societies-Integrating the Human and Artificial Perspectives[M].Berlin:Springer,2001.175-194.
[4]
Liu L,Yu E,Mylopoulos J.Security design based on social modeling[A].Proceedings of Thirteenth Annual International Computer Software & Application Conference (COMPSAC)[C].Chicago,2006.71-76.
[5]
Schneier B.Attack trees:modeling security threats[J].Dr Dobb'' s Journal,1999,12(24):21-29.
[6]
Liu L,Yu E,Mylopoulos J.Security and privacy requirements analysis within a social setting[A].The 11th IEEE Int Requirements Engineering Conference (RE'' 03)[C].Monterey Bay,California USA,2003.8-12.
[7]
Sandu R.Good-enough security:towards a pragmatic businessdriven discipline[J].IEEE Internet Computing.Security Track,2003.7(1):66-68.
[8]
Yu E.Agent-oriented modelling:software versus the world[A].Agent-Oriented Software Engineering AOSE-2001 Workshop Proceedings[C].LNCS 2222.Springer Verlag,2001.206-225.
[9]
Yu E.Towards modeling and reasoning support for early-phase requirement engineering[A].Proceedings of the 3rd IEEE International Symposium on Requirements Engineering(RE97)[C].Washington,1997.226-235.