Sciweavers

648 search results - page 81 / 130
» Software requirements validation via task analysis
Sort
View
SACMAT
2005
ACM
14 years 3 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
TSE
1998
85views more  TSE 1998»
13 years 9 months ago
A Methodology for Feature Interaction Detection in the AIN 0.1 Framework
—In this paper, we propose an integrated methodology for specifying AIN and switch-based features and analyzing their interactions in the AIN 0.1 framework. The specification of ...
Fuchun Joseph Lin, Hong Liu, Abhijit Ghosh
ICSE
2008
IEEE-ACM
14 years 10 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
UML
2005
Springer
14 years 3 months ago
Specifying Precise Use Cases with Use Case Charts
Use cases are a popular method for capturing and structuring software requirements. The informality of use cases is both a blessing and a curse. It enables easy application and lea...
Jon Whittle
EMSOFT
2008
Springer
13 years 11 months ago
Automatically transforming and relating Uppaal models of embedded systems
Relations between models are important for effective automatic validation, for comparing implementations with specifications, and for increased understanding of embedded systems d...
Timothy Bourke, Arcot Sowmya