Sciweavers

657 search results - page 14 / 132
» Secure and Usable Requirements Engineering
Sort
View
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 11 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
RE
2001
Springer
13 years 12 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
ICSE
2003
IEEE-ACM
14 years 7 months ago
From HCI to Software Engineering and Back
Methods to assess and ensure system usability are becoming increasingly important as market edge becomes less dependent on function and more dependent on ease of use, and as recog...
José Creissac Campos, Michael D. Harrison
EUC
2008
Springer
13 years 9 months ago
UMDD: User Model Driven Software Development
The existing software engineering seldom considers software usability, and Human-Computer Interaction (HCI) techniques which can improve the software usability cannot guarantee de...
Xiaochun Wang, Yuanchun Shi
ESSOS
2009
Springer
13 years 11 months ago
Pattern-Based Confidentiality-Preserving Refinement
Abstract. We present an approach to security requirements engineering, which makes use of special kinds of problem frames that serve to structure, characterize, analyze, and solve ...
Holger Schmidt