This paper presents a requirements engineering framework based on the notions of Actor, Goal, and Intentional Dependency, and applies it to a case study in the field of Informatio...
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
- We present a comprehensive UML statechart diagram analysis framework. This framework allows one to progressively perform different analysis operations to analyze UML statechart d...