Sciweavers

674 search results - page 4 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
IJISEC
2006
88views more  IJISEC 2006»
13 years 7 months ago
Requirements engineering for trust management: model, methodology, and reasoning
Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizatio...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
TSE
2008
107views more  TSE 2008»
13 years 7 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
SIS
2004
13 years 9 months ago
Towards a Systematic Development of Secure Systems
In this paper we outline a new process model for security engineering. This process model extends object oriented, use case driven software development by the systematic treatment ...
Ruth Breu, Klaus Burger, Michael Hafner, Gerhard P...
IEAAIE
2004
Springer
14 years 1 months ago
Natural Language Requirements Analysis and Class Model Generation Using UCDA
This paper presents a methodology to automate natural language requirements analysis and class model generation based on the Rational Unified Process (RUP). Use-case language schem...
Dong Liu, Kalaivani Subramaniam, Armin Eberlein, B...
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
14 years 3 days ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt