Sciweavers

716 search results - page 51 / 144
» Security Requirements Engineering: A Framework for Represent...
Sort
View
ICSM
2008
IEEE
14 years 3 months ago
Traceability for the maintenance of secure software
Traceability links among different software engineering artifacts make explicit how a software system was implemented to accommodate its requirements. For secure and dependable so...
Yijun Yu, Jan Jürjens, John Mylopoulos
CN
2007
117views more  CN 2007»
13 years 8 months ago
Secure multicast in dynamic environments
A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually, one ‘‘group key’’ is shared by all approved members. Ho...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin...
SERA
2010
Springer
13 years 7 months ago
Representing Unique Stakeholder Perspectives in BPM Notations
—Evidence shows that proposals for new modeling notations emerge and evolution of current ones are becoming more complex, often in an attempt to satisfy the many different modeli...
Carlos Monsalve, Alain April, Alain Abran
ICSM
2005
IEEE
14 years 2 months ago
Annotated Inclusion Constraints for Precise Flow Analysis
Program flow analysis has many applications in software tools for program understanding, restructuring, verification, testing and reverse engineering. There are two important re...
Ana Milanova, Barbara G. Ryder
KBSE
2006
IEEE
14 years 2 months ago
Effective Generation of Interface Robustness Properties for Static Analysis
A software system interacts with its environment through system interfaces. Robustness of software systems are governed by various temporal properties related to these interfaces,...
Mithun Acharya, Tanu Sharma, Jun Xu, Tao Xie