Sciweavers

716 search results - page 13 / 144
» Security Requirements Engineering: A Framework for Represent...
Sort
View
ICSE
2009
IEEE-ACM
13 years 6 months ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan
HASE
2008
IEEE
14 years 3 months ago
A Grammar-Based Reverse Engineering Framework for Behavior Verification
A high assurance system requires both functional and nonfunctional correctness before the system is put into operation. To examine whether a system’s actual performance complies...
Chunying Zhao, Kang Zhang
IEE
2008
100views more  IEE 2008»
13 years 8 months ago
A lightweight technique for assessing risks in requirements analysis
: A simple and practical technique for assessing the risks, that is, the potential for error, and consequent loss, in software system development, acquired during a requirements en...
Kenneth Boness, Anthony Finkelstein, Rachel Harris...
DOCENG
2008
ACM
13 years 10 months ago
A concise XML binding framework facilitates practical object-oriented document engineering
Semantic web researchers tend to assume that XML Schema and OWL-S are the correct means for representing the types, structure, and semantics of XML data used for documents and int...
Andruid Kerne, Zachary O. Toups, Blake Dworaczyk, ...
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
14 years 3 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...