Sciweavers

102 search results - page 3 / 21
» Secure and Dependable Patterns in Organizations: An Empirica...
Sort
View
SECURWARE
2008
IEEE
14 years 2 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
IEEEARES
2007
IEEE
14 years 2 months ago
A Pattern System for Security Requirements Engineering
We present a pattern system for security requirements engineering, consisting of security problem frames and concretized security problem frames. These are special kinds of proble...
Denis Hatebur, Maritta Heisel, Holger Schmidt
FLAIRS
2004
13 years 10 months ago
Case-Based Bayesian Network Classifiers
We propose a new approach for learning Bayesian classifiers from data. Although it relies on traditional Bayesian network (BN) learning algorithms, the effectiveness of our approa...
Eugene Santos, Ahmed Huessin
ESEM
2008
ACM
13 years 10 months ago
Socio-technical congruence: a framework for assessing the impact of technical and work dependencies on software development prod
The identification and management of work dependencies is a fundamental challenge in software development organizations. This paper argues that modularization, the traditional tec...
Marcelo Cataldo, James D. Herbsleb, Kathleen M. Ca...
SAC
2009
ACM
14 years 3 months ago
Prestige-based peer sampling service: interdisciplinary approach to secure gossip
The Peer Sampling Service (PSS) has been proposed as a method to initiate and maintain the set of connections between nodes in unstructured peer to peer (P2P) networks. The PSS us...
Gian Paolo Jesi, Edoardo Mollona, Srijith K. Nair,...