Sciweavers

657 search results - page 9 / 132
» Secure and Usable Requirements Engineering
Sort
View
SIGSOFT
2005
ACM
14 years 8 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
SOUPS
2005
ACM
14 years 29 days ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
ACMDIS
2000
ACM
13 years 11 months ago
From Usability Lab to "Design Collaboratorium": Reframing Usability Practice
This paper presents an exploratory process in which three industrial usability groups, in cooperation with HCI researchers, worked to reframe their own work practice. The usabilit...
Jacob Buur, Susanne Bødker
ESWS
2006
Springer
13 years 11 months ago
Semantic Web Policies - A Discussion of Requirements and Research Issues
Policies are pervasive in web applications. They play crucial roles in enhancing security, privacy and usability of distributed services. There has been extensive research in the a...
Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, ...
RE
2005
Springer
14 years 26 days ago
Modeling Security Requirements Through Ownership, Permission and Delegation
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...