Sciweavers

222 search results - page 17 / 45
» Trust Trade-off Analysis for Security Requirements Engineeri...
Sort
View
AGENTS
2001
Springer
14 years 1 days ago
A knowledge level software engineering methodology for agent oriented programming
Our goal in this paper is to introduce and motivatea methodology, called Tropos, for building agent oriented software systems. Tropos is based on two key ideas. First, the notion ...
Paolo Bresciani, Anna Perini, Paolo Giorgini, Faus...
ISSTA
2010
ACM
13 years 11 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Video Analysis and Compression on the STI Cell Broadband Engine Processor
With increased concern for physical security, video surveillance is becoming an important business area. Similar camera-based system can also be used in such diverse applications ...
Lurng-Kuo Liu, Sreeni Kesavarapu, Jonathan Connell...
ASE
2007
121views more  ASE 2007»
13 years 7 months ago
Computer-aided Support for Secure Tropos
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Fabio Massacci, John Mylopoulos, Nicola Zannone
EUROMICRO
2009
IEEE
14 years 2 months ago
The Cycle of Trust in Mixed Service-Oriented Systems
—Many collaboration platforms are realized as service-oriented systems enabling flexible compositions of services and support of interactions. Interactions between entities in s...
Florian Skopik, Daniel Schall, Schahram Dustdar