Sciweavers

102 search results - page 3 / 21
» A common criteria based security requirements engineering pr...
Sort
View
ICCSA
2004
Springer
14 years 22 days ago
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks
In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the...
Hoon Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moo...
ACSAC
2005
IEEE
14 years 29 days ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
ER
2009
Springer
166views Database» more  ER 2009»
14 years 1 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
13 years 12 months ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
DEXAW
2003
IEEE
93views Database» more  DEXAW 2003»
14 years 19 days ago
A business process-driven approach to security engineering
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical ...
Antonio Mana, José A. Montenegro, Carsten R...