Sciweavers

626 search results - page 10 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
HICSS
2005
IEEE
140views Biometrics» more  HICSS 2005»
14 years 1 months ago
On Contamination in Information Ecosystems
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may inte...
Bengt Carlsson, Andreas Jacobsson
RIAO
2000
13 years 9 months ago
Assisting requirements engineering with semantic document analysis
Requirements engineering is the first stage in the software life-cycle and is concerned with discovering and managing a software system's services, constraints and goals. Req...
Paul Rayson, Roger Garside, Peter Sawyer
PATAT
1997
Springer
97views Education» more  PATAT 1997»
13 years 11 months ago
Space Allocation: An Analysis of Higher Education Requirements
In October, 1996 we sent a questionnaire on the subject of university space allocation to the estate managers of ninety six British universities. This was conducted as part of the...
Edmund K. Burke, D. B. Varley
CCS
2009
ACM
14 years 8 months ago
Expressive policy analysis with enhanced system dynamicity
Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy analysis should at least (i) be expressive (ii) take accou...
Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra R...
POPL
2012
ACM
12 years 3 months ago
Multiple facets for dynamic information flow
JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code. ...
Thomas H. Austin, Cormac Flanagan