Sciweavers

156 search results - page 20 / 32
» Requirements Traceability
Sort
View
ITCC
2005
IEEE
14 years 1 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
13 years 11 months ago
Sequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Reihaneh Safavi-Naini, Yejing Wang
ICSE
2007
IEEE-ACM
14 years 7 months ago
STRADA: A Tool for Scenario-Based Feature-to-Code Trace Detection and Analysis
Software engineers frequently struggle with understanding the relationships between the source code of a system and its requirements or high-level features. These relationships ar...
Alexander Egyed, Gernot Binder, Paul Grünbach...
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
14 years 1 months ago
Implementation-Oriented Secure Architectures
We propose a framework for constructing secure systems at the architectural level. This framework is composed of an implementation-oriented formalization of a system’s architect...
Daniel Conte de Leon, Jim Alves-Foss, Paul W. Oman
IBERAMIA
2004
Springer
14 years 24 days ago
Checking Social Properties of Multi-agent Systems with Activity Theory
Many approaches of the agent paradigm emphasize the social and intentional features of their systems, what are called social properties. The study of these aspects demands their ow...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...