Sciweavers

674 search results - page 10 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
SEDE
2010
13 years 8 months ago
On Software Test Estimate and Requirement Tracking
Test is a key activity for ensuring software quality. There is always pressure from project sponsor and management for software development team to commit to shorter schedule and ...
Jing-Chiou Liou
ICFEM
2003
Springer
14 years 3 months ago
Formalization, Testing and Execution of a Use Case Diagram
Abstract. Errors in a requirements model have prolonged detrimental effects on reliability, cost, and safety of a software system. It is very costly to fix these errors in later ...
Wuwei Shen, Shaoying Liu
JNW
2008
112views more  JNW 2008»
13 years 10 months ago
A Conceptual Model for Analysis and Design of Tunable Security Services
Security is an increasingly important issue for networked services. However, since networked environments may exhibit varying networking behavior and contain heterogeneous devices ...
Stefan Lindskog, Zoltán Faigl, Anna Brunstr...
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 11 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
WER
2007
Springer
14 years 4 months ago
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Faranak Farzad, Eric Yu, Patrick C. K. Hung