Sciweavers

1527 search results - page 3 / 306
» From Requirements to Design: Formalizing the Key Steps
Sort
View
WISE
2008
Springer
14 years 2 months ago
Requirements for Rich Internet Application Design Methodologies
Rich Internet Applications (RIAs) are quickly becoming the de facto standard for interactive web applications on the Internet, featuring rich interfaces that increase user usabilit...
Jevon M. Wright, Jens Dietrich
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 8 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
APSEC
2005
IEEE
14 years 1 months ago
Simulation-based Validation and Defect Localization for Evolving, Semi-Formal Requirements Models
When requirements models are developed in an iterative and evolutionary way, requirements validation becomes a major problem. In order to detect and fix problems early, the speci...
Christian Seybold, Silvio Meier
ICSE
2003
IEEE-ACM
14 years 7 months ago
Towards a Systems Engineering Pattern Language: Applying i* to Model Requirements-Architecture Patterns
This paper reports the results of exploratory research to develop a pilot pattern language for systems engineers at BAE SYSTEMS. The pattern language was designed to encapsulate k...
Pete Pavan, Neil A. M. Maiden, Xiaohong Zhu
CRYPTO
2003
Springer
109views Cryptology» more  CRYPTO 2003»
14 years 26 days ago
Weak Key Authenticity and the Computational Completeness of Formal Encryption
Abstract. A significant effort has recently been made to rigorously relate the formal treatment of cryptography with the computational one. A first substantial step in this dire...
Omer Horvitz, Virgil D. Gligor