Sciweavers

2002 search results - page 109 / 401
» An Approach for Assessment of Reliability of the System Usin...
Sort
View
CAISE
2003
Springer
14 years 2 months ago
Goal-Oriented Requirements Engineering: A Case Study in E-government
This paper presents a requirements engineering framework based on the notions of Actor, Goal, and Intentional Dependency, and applies it to a case study in the field of Informatio...
Paolo Donzelli, Paolo Bresciani
ICAIL
2007
ACM
14 years 28 days ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
SAJ
2002
97views more  SAJ 2002»
13 years 8 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier
CCS
2004
ACM
14 years 2 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
SQJ
2008
94views more  SQJ 2008»
13 years 9 months ago
Simulation-based analysis of UML statechart diagrams: methods and case studies
- We present a comprehensive UML statechart diagram analysis framework. This framework allows one to progressively perform different analysis operations to analyze UML statechart d...
Jiexin Lian, Zhaoxia Hu, Sol M. Shatz