Sciweavers

1352 search results - page 14 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CBSQ
2003
Springer
14 years 23 days ago
COTS-Based Requirements Engineering
There is growing interest in the notion of software development through the planned integration of COTS (Commercial Off-The-Shelf) products. The potential advantages of this integ...
Carina Alves
ACSAC
2003
IEEE
14 years 25 days ago
MLS-PCA: A High Assurance Security Architecture for Future Avionics
1 DOD Joint Vision 2020 (JV2020) is the integrated multi-service planning document for conduct among coalition forces of future warfare. It requires the confluence of a number of k...
Clark Weissman
DATE
2009
IEEE
154views Hardware» more  DATE 2009»
14 years 2 months ago
Reliability aware through silicon via planning for 3D stacked ICs
Abstract—This work proposes reliability aware through silicon via (TSV) planning for the 3D stacked silicon integrated circuits (ICs). The 3D power distribution network is modele...
Amirali Shayan Arani, Xiang Hu, He Peng, Chung-Kua...
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
13 years 7 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
EUROMICRO
2007
IEEE
14 years 1 months ago
Understanding Success and Failure Profiles of ERP Requirements Engineering: an Empirical Study
Organizations adopting Enterprise Resource Planning (ERP) are also adopting standard ERPvendor-specific process models for engineering their requirements. Making successfully a li...
Maya Daneva