Sciweavers

762 search results - page 27 / 153
» How to realize
Sort
View
RE
2004
Springer
14 years 4 months ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
PROMS
2001
Springer
110views Multimedia» more  PROMS 2001»
14 years 3 months ago
On the End-User QoS-Awareness of a Distributed Service Environment
A lot of attention has been given to network quality of service and efforts to make layers on top of the network also QoS-aware increase noticeably. This paper explores QoS-aware s...
Ing Widya, R. E. Stap, L. J. Teunissen, B. Frank H...
RE
2006
Springer
13 years 10 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
SEMWEB
2007
Springer
14 years 5 months ago
Some Considerations on Openness of Design Information
Towards a sustainable society, design of artifacts must be optimized with limited resources on the earth while keeping our life. In order to realize it, I emphasize openness of des...
Hideaki Takeda
TEAA
2005
Springer
126views Hardware» more  TEAA 2005»
14 years 4 months ago
Towards a Secure Data Stream Management System
Abstract. Todays data stream management systems (DSMSs) lack security functionality. Based on adversary scenarios we show how a DSMS architecture can be protected. We sketch a gene...
Wolfgang Lindner, Jörg Meier