Sciweavers

6978 search results - page 77 / 1396
» Reframing Requirements Analysis
Sort
View
IACR
2011
223views more  IACR 2011»
12 years 9 months ago
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Abstract. We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S´ec...
Jean-Sébastien Coron, Aline Gouget, Thomas ...
CAV
2009
Springer
150views Hardware» more  CAV 2009»
14 years 10 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
14 years 5 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
GECCO
2010
Springer
141views Optimization» more  GECCO 2010»
14 years 1 months ago
Today/future importance analysis
SBSE techniques have been widely applied to requirements selection and prioritization problems in order to ascertain a suitable set of requirements for the next release of a syste...
Yuanyuan Zhang, Enrique Alba, Juan J. Durillo, Sig...
RE
2010
Springer
13 years 5 months ago
Dependability Arguments with Trusted Bases
An approach is suggested for arguing that a system is dependable. The key idea is to structure the system so that critical requirements are localized in small, reliable subsets of ...
Eunsuk Kang, Daniel Jackson