Sciweavers

1005 search results - page 50 / 201
» Information systems security engineering: a critical compone...
Sort
View
RE
2006
Springer
13 years 8 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
ICSE
2001
IEEE-ACM
14 years 1 months ago
Theory of Software Reliability Based on Components
We present a foundational theory of software system reliability based on components. The theory describes how component developers can design and test their components to produce ...
Richard G. Hamlet, David V. Mason, Denise M. Woit
REFSQ
2010
Springer
13 years 10 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...
ISSA
2008
13 years 10 months ago
Social Aspects of Information Security
Social Engineering (SE) threats have constituted a reality for Information Technology (IT) systems for many years. Yet, even the latest editions of the generally accepted Informat...
Evangelos Frangopoulos, Mariki M. Eloff, Lucas M. ...
AOSD
2010
ACM
14 years 2 months ago
A permission system for secure AOP
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of ...
Wouter De Borger, Bart De Win, Bert Lagaisse, Wout...