: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Software agents have become very popular in the last six or so years. They have been used successfully to filter information, match people with similar interests and automate repe...
This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method in...
Simara Vieira da Rocha, Zair Abdelouahab, Eduardo ...
The primary objective of this paper is to present the deÿnition of a new dynamic, linear and modal logic for security protocols. The logic is compact, expressive and formal. It a...
For extended enterprises, value-chain integration means that enterprise business systems can no longer be confined to internal processes, applications, and data repositories. What...