Sciweavers

902 search results - page 4 / 181
» Security and Trust Requirements Engineering
Sort
View
ISSRE
2008
IEEE
14 years 1 months ago
Assessing the Effect of Software Failures on Trust Assumptions
The contribution of this paper is a technique to assess whether software failures during operational use can invalidate the trust assumptions and, hence, the adequacy of the softw...
Qian Feng, Robyn R. Lutz
WS
2004
ACM
14 years 24 days ago
Trust evaluation in ad-hoc networks
Title of Thesis: DISTRIBUTED TRUST EVALUATION IN AD-HOC NETWORKS Georgios E. Theodorakopoulos, Master of Science, 2004 Thesis directed by: Professor John S. Baras Department of El...
George Theodorakopoulos, John S. Baras
RE
2002
Springer
13 years 7 months ago
Security Requirements Engineering: When Anti-Requirements Hit the Fan
Everyone agrees that security is a problem, ranging from Microsoft to the banks that have been recent victims of rogue traders. What is paradoxical is that there does not seem to ...
Robert Crook, Darrel C. Ince, Luncheng Lin, Bashar...
IEEEARES
2007
IEEE
14 years 1 months ago
A Pattern System for Security Requirements Engineering
We present a pattern system for security requirements engineering, consisting of security problem frames and concretized security problem frames. These are special kinds of proble...
Denis Hatebur, Maritta Heisel, Holger Schmidt