Sciweavers

1352 search results - page 38 / 271
» Designing Security Requirements Models Through Planning
Sort
View
267
Voted
SIGCOMM
2012
ACM
13 years 5 months ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
114
Voted
KBSE
2007
IEEE
15 years 9 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
ECOOPW
2003
Springer
15 years 8 months ago
Modeling Variability for Object-Oriented Product Lines
The concept of a software product line is a promising approach for increasing planned reusability in industry. For planning future requirements, the integration of domain analysis ...
Matthias Riebisch, Detlef Streitferdt, Ilian Pasho...
OIR
2007
123views more  OIR 2007»
15 years 2 months ago
The IP's guide to the galaxy of portal planning: part III - administrative framework
Purpose – This article is the third in a four-part series that aims to illustrate the process involved in planning a portal and creating a portal definition document. Design/me...
Amy M. Finley, Rebecca H. Augustyniak
ICAIL
2007
ACM
15 years 7 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...