System security requirements analysis with answer set programming.
Gideon D. BibuNobukazu YoshiokaJulian A. PadgetPublished in: RESS (2012)
Keyphrases
- answer set programming
- requirements analysis
- goal oriented
- logic programs
- logic programming
- answer sets
- constraint logic programming
- information security
- stable model semantics
- causal theories
- knowledge representation
- answer set programs
- software development
- access control
- mental imagery
- security requirements
- network security
- information systems
- stable models
- development process
- update semantics
- haplotype inference
- cryptographic protocols
- business processes
- high level
- decision making
- databases