This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Software engineers frequently struggle with understanding the relationships between the source code of a system and its requirements or high-level features. These relationships ar...
We propose a framework for constructing secure systems at the architectural level. This framework is composed of an implementation-oriented formalization of a system’s architect...
Daniel Conte de Leon, Jim Alves-Foss, Paul W. Oman
Many approaches of the agent paradigm emphasize the social and intentional features of their systems, what are called social properties. The study of these aspects demands their ow...