Sciweavers

6147 search results - page 11 / 1230
» Requirements, Architectures and Risks
Sort
View
IEEEARES
2009
IEEE
14 years 4 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
EDOC
2002
IEEE
14 years 2 months ago
Model-Based Risk Assessment to Improve Enterprise Security
The main objective of the CORAS project is to provide methods and tools for precise, unambiguous, and efficient risk assessment of security critical systems. To this end, we advoc...
Jan Øyvind Aagedal, Folker den Braber, Theo...
HICSS
2011
IEEE
209views Biometrics» more  HICSS 2011»
13 years 1 months ago
A Risk Management Framework for Design Science Research
As a new and complex form of research, which combines very heterogeneous activities requiring different skills, Design Science Research (DSR) in IS has new and difficult areas of ...
Richard Baskerville, Jan Pries-Heje, John R. Venab...
CN
2002
87views more  CN 2002»
13 years 9 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
EDOC
2008
IEEE
13 years 10 months ago
A Tactic-Based Approach to Embodying Non-functional Requirements into Software Architectures
This paper presents an approach for embodying nonfunctional requirements (NFRs) into software architecture using architectural tactics. Architectural tactics are reusable architec...
Suntae Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park