Sciweavers

716 search results - page 23 / 144
» Security Requirements Engineering: A Framework for Represent...
Sort
View
APSEC
2000
IEEE
14 years 1 months ago
Component-based software engineering: technologies, development frameworks, and quality assurance schemes
Component-based software development approach is based on the idea to develop software systems by selecting appropriate off-the-shelf components and then to assemble them with a w...
Xia Cai, Michael R. Lyu, Kam-Fai Wong, Roy Ko
WER
2007
Springer
14 years 2 months ago
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Faranak Farzad, Eric Yu, Patrick C. K. Hung
ACSC
2010
IEEE
13 years 3 months ago
Analysis of the periodical payment framework using restricted proxy certificates
This paper discusses the design and implementation of a payment framework that is loosely based on the direct debit payment model. We define such payments as one in which customer...
Grigori Goldman, Lawrie Brown
RE
2002
Springer
13 years 8 months ago
Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy
Privacy has recently become a prominent issue in the context of electronic commerce websites. Increasingly, privacy policies posted on such websites are receiving considerable att...
Annie I. Antón, Julia Brande Earp, Angela R...
ICSEA
2007
IEEE
14 years 3 months ago
Making Cost Effective Security Decision with Real Option Thinking
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
Jingyue Li, Xiaomeng Su