Sciweavers

488 search results - page 8 / 98
» ST-Tool: A CASE Tool for Security Requirements Engineering
Sort
View
RE
2001
Springer
13 years 11 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
SIGSOFT
2002
ACM
14 years 8 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
SEC
2001
13 years 8 months ago
Extended Description Techniques for Security Engineering
There is a strong demand for techniques to aid development and modelling of security critical systems. Based on general security evaluation criteria, we show how to extend the syst...
Guido Wimmel, Alexander K. Wißpeintner
RE
2002
Springer
13 years 7 months ago
Rationale-Based Use Case Specification
Abstract. Few requirements engineering techniques are widely applied in industry. This can
Allen H. Dutoit, Barbara Paech
ECBS
2011
IEEE
271views Hardware» more  ECBS 2011»
12 years 7 months ago
MoPED: A Model-Based Provisioning Engine for Dependability in Component-Based Distributed Real-Time Embedded Systems
—Developing dependable distributed real-time and embedded (DRE) systems incurs significant complexities in the tradeoffs resulting from the different conflicting attributes of ...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...