Sciweavers

3103 search results - page 264 / 621
» Managing Concern Interfaces
Sort
View
AOSD
2004
ACM
14 years 4 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
14 years 3 months ago
Knowledge-Based IS Implementation Support: An Application to the IS Change Agent Role Problem
The threat of abandoned or extensively overhauled IS is a major concern for both MIS specialists and businesses. This concern may stem from the mismatch between MIS specialist cha...
Meral Binbasioglu, Elaine Winston
JSAI
2001
Springer
14 years 3 months ago
Enabling Public Discourse
The importance of public engagement and awareness concerning environmental issues has been widely recognised in the development of a sustainable community. Recent efforts by author...
Keiichi Nakata
FOAL
2007
ACM
14 years 2 months ago
On bytecode slicing and aspectJ interferences
AspectJ aims at managing tangled concerns in Java systems. Crosscutting aspect definitions are woven into the Java bytecode at compile-time. Whether the better modularization intr...
Antonio Castaldo D'Ursi, Luca Cavallaro, Mattia Mo...
FOSAD
2000
Springer
14 years 2 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman