Sciweavers

2429 search results - page 28 / 486
» Using Aspects to Design a Secure System
Sort
View
AOSD
2003
ACM
14 years 28 days ago
Persistence as an aspect
Persistence - the storage and retrieval of application data from secondary storage media - is often used as a classical example of a crosscutting concern. It is widely assumed tha...
Awais Rashid, Ruzanna Chitchyan
SECURWARE
2007
IEEE
14 years 1 months ago
Temporal Verification in Secure Group Communication System Design
The paper discusses an experience in using a realtime UML/SysML profile and a formal verification toolkit to check a secure group communication system against temporal requirement...
Benjamin Fontan, Sara Mota, Pierre de Saqui-Sannes...
IEEEARES
2007
IEEE
14 years 2 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...
ISSE
2010
13 years 6 months ago
URDAD as a semi-formal approach to analysis and design
The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object M...
Fritz Solms, Dawid Loubser
IEEEARES
2006
IEEE
14 years 1 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson