Sciweavers

902 search results - page 12 / 181
» Security and Trust Requirements Engineering
Sort
View
SIGSOFT
2005
ACM
14 years 8 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
WETICE
2003
IEEE
14 years 20 days ago
Trust Dynamics for Collaborative Global Computing
Recent advances in networking technology have increased the potential for dynamic enterprise collaborations between an open set of entities on a global scale. The security of thes...
Colin English, Sotirios Terzis, Waleed Wagealla, H...
CCS
1994
ACM
13 years 11 months ago
Support for the File System Security Requirements of Computational E-Mail Systems
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
Trent Jaeger, Atul Prakash
DAC
2007
ACM
14 years 8 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
SDMW
2004
Springer
14 years 23 days ago
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
Abstract. Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one com...
Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslet...