Sciweavers

1116 search results - page 10 / 224
» Secure Mediation: Requirements and Design
Sort
View
AOSD
2004
ACM
14 years 2 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
ROMAN
2007
IEEE
144views Robotics» more  ROMAN 2007»
14 years 3 months ago
Eliciting Requirements for a Robotic Toy for Children with Autism - Results from User Panels
— The discussion presented in this paper is part of our investigation in the IROMEC project which recognizes the important role of play in child development. The project investig...
Ben Robins, Nuno Otero, Ester Ferrari, Kerstin Dau...
IEEEARES
2007
IEEE
14 years 3 months ago
Security Requirements for a Semantic Service-oriented Architecture
Service-oriented architectures (SOAs) are a commonly used paradigm for IT infrastructures in various fields. Due to their flexibility and the easy accessibility of their underly...
Stefan Durbeck, Rolf Schillinger, Jan Kolter
ER
2009
Springer
166views Database» more  ER 2009»
14 years 3 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
GI
2007
Springer
14 years 29 days ago
Tracking the Asymmetric Threat - Operational Requirements and Technical Solutions for Security Applications
: The asymmetric adversary poses a serious threat to civil and military facilities. Hence, the defence against such adversaries, the so-called anti asymmetric warfare, is of intere...
Felix Opitz, Kaeye Dästner, Thomas Kausch