Sciweavers

674 search results - page 67 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
SACMAT
2009
ACM
14 years 4 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
SACMAT
2009
ACM
14 years 4 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
FMAM
2010
157views Formal Methods» more  FMAM 2010»
13 years 8 months ago
An Experience on Formal Analysis of a High-Level Graphical SOA Design
: In this paper, we present the experience gained with the participation in a case study in which a novel high-level design language (UML4SOA) was used to produce a service-oriente...
Maurice H. ter Beek, Franco Mazzanti, Aldi Sulova
HICSS
2002
IEEE
91views Biometrics» more  HICSS 2002»
14 years 3 months ago
The Planet Method for Designing Relationships in B2B E-commerce
Business to Business (B2B) relationships in Ecommerce are becoming increasingly important. However, there is little guidance available for managers about how relationships should ...
Alistair G. Sutcliffe, Norma Lammont
ASM
2010
ASM
14 years 5 months ago
Secrecy UML Method for Model Transformations
Abstract. This paper introduces the subject of secrecy models development by transformation, with formal validation. In an enterprise, constructing a secrecy model is a participato...
Waël Hassan, Nadera Slimani, Kamel Adi, Luigi...