Sciweavers

87 search results - page 4 / 18
» Architectural Risk Analysis of Software Systems Based on Sec...
Sort
View
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
13 years 11 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt
SEKE
2007
Springer
14 years 1 months ago
Requirement Analysis Evolution through Patterns
This paper presents a strategy, based on requirement patterns (RP), aimed at improving the requirement analysis discipline by allowing business analysts (BA) to produce more relia...
Luca Vetti Tagliati, Roger Johnson, George Roussos
APSCC
2008
IEEE
13 years 9 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré
CCS
2007
ACM
14 years 1 months ago
Analysis of three multilevel security architectures
Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectura...
Timothy E. Levin, Cynthia E. Irvine, Clark Weissma...
ICSE
2007
IEEE-ACM
14 years 1 months ago
Agility and Experimentation: Practical Techniques for Resolving Architectural Tradeoffs
This paper outlines our experiences with making architectural tradeoffs between performance, availability, security, and usability, in light of stringent cost and time-to-market c...
T. C. Nicholas Graham, Rick Kazman, Chris Walmsley