Sciweavers

1352 search results - page 32 / 271
» Designing Security Requirements Models Through Planning
Sort
View
BIRTHDAY
2008
Springer
13 years 9 months ago
From Domain to Requirements
This is a discursive paper. That is, it shows some formulas (but only as examples so that the reader may be convinced that there is, perhaps, some substance to our claims), no theo...
Dines Bjørner
IEEEARES
2007
IEEE
14 years 1 months ago
From Trust to Dependability through Risk Analysis
The importance of critical systems has been widely recognized and several efforts are devoted to integrate dependability requirements in their development process. Such efforts re...
Yudistira Asnar, Paolo Giorgini, Fabio Massacci, N...
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
13 years 11 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
ICC
2007
IEEE
105views Communications» more  ICC 2007»
14 years 1 months ago
A QoS-Based Scheme for Planning and Dimensioning of Optical Label Switched Networks
— To support the growing demand for transmission, Optical Label Switching (OLS) technology seems to be attractive due to its ability to allow fast switching and Quality of Servic...
Yassine Khlifi, Noureddine Boudriga, Mohammad S. O...
EMISA
2006
Springer
13 years 11 months ago
Challenges and Solutions in Planning Information Systems for Networked Value Constellations
: Nowadays businesses often decide to form networked value constellations in order to satisfy complex customer needs. To fulfill the value-based requirements of an e-Business idea ...
Novica Zarvic, Maya Daneva