Sciweavers

249 search results - page 22 / 50
» Modelling Security Goals in Business Processes
Sort
View
CAISE
2006
Springer
13 years 11 months ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
FLAIRS
2006
13 years 9 months ago
Towards an Ontology-Driven Approach for the Interoperability Problem in Security Compliance
In today's IT-centric, regulated and competitive environment, businesses rely more heavily on IT technologies. Organizations are often challenged by customers, business partn...
Alfred Ka Yiu Wong, Nandan Paramesh, Pradeep Kumar...
SPLC
2010
13 years 6 months ago
Stratified Analytic Hierarchy Process: Prioritization and Selection of Software Features
Product line engineering allows for the rapid development of variants of a domain specific application by using a common set of reusable assets often known as core assets. Variabil...
Ebrahim Bagheri, Mohsen Asadi, Dragan Gasevic, Sam...
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
14 years 2 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
ER
2009
Springer
130views Database» more  ER 2009»
14 years 2 months ago
Designing Law-Compliant Software Requirements
New laws, such as HIPAA and SOX, are increasingly impacting the design of software systems, as business organisations strive to comply. This paper studies the problem of generating...
Alberto Siena, John Mylopoulos, Anna Perini, Angel...