Sciweavers

597 search results - page 11 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
CAINE
2003
13 years 9 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
GCC
2004
Springer
14 years 26 days ago
A Software Engineering Perspective for Services Security
Services are usually developed and deployed independently; and systems can be formed by composing relevant services to achieve set goals. In such an open and dynamic environment, s...
Jun Han
OOPSLA
2007
Springer
14 years 1 months ago
Synthesizing reactive systems from LSC requirements using the play-engine
Live Sequence Charts (LSCs) is a scenario-based language for modeling object-based reactive systems with liveness properties. A tool called the Play-Engine allows users to create ...
Hillel Kugler, Cory Plock, Amir Pnueli
ISSRE
2010
IEEE
13 years 6 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
TSE
2008
128views more  TSE 2008»
13 years 7 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón