Sciweavers

341 search results - page 3 / 69
» A Security Engineering Process based on Patterns
Sort
View
EWSPT
2001
Springer
14 years 1 months ago
Towards a Living Software Development Process Based on Process Patterns
A Software Development Process for a certain enterprise and/or a certain project will usually integrate elements from a variety of existing process models, comprising generic stand...
Michael Gnatz, Frank Marschall, Gerhard Popp, Andr...
ACSAC
2008
IEEE
14 years 3 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
IEEEARES
2007
IEEE
14 years 2 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...
FOSSACS
2005
Springer
14 years 2 months ago
Bridging Language-Based and Process Calculi Security
Language-based and process calculi-based information security are well developed fields of computer security. Although these fields have much in common, it is somewhat surprising...
Riccardo Focardi, Sabina Rossi, Andrei Sabelfeld
FASE
2009
Springer
14 years 3 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel