Sciweavers

1148 search results - page 128 / 230
» Integrating System Modeling with Project Management - A Case...
Sort
View
IWIA
2006
IEEE
15 years 9 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
CAISE
2006
Springer
15 years 6 months ago
Modeling Airport Security Regulations in Focal
We describe the formal models of two standards related to airport security: one at the international level and the other at the European level. These models are expressed using the...
David Delahaye, Jean-Frédéric &Eacut...
CSMR
2002
IEEE
15 years 8 months ago
Architecture-Centric Software Evolution by Software Metrics and Design Patterns
It is shown how software metrics and architectural patterns can be used for the management of software evolution. In the presented architecture-centric software evolutionmethod th...
Juha Gustafsson, Jukka Paakki, Lilli Nenonen, A. I...
OTM
2007
Springer
15 years 9 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
XPU
2007
Springer
15 years 9 months ago
Usability in Agile Software Development: Extending the Interaction Design Process with Personas Approach
The current agile software development methods do not seem to address usability and interaction design issues enough, i.e., the interaction design process may remain implicit. Howe...
Jukka Haikara