Sciweavers

2429 search results - page 41 / 486
» Using Aspects to Design a Secure System
Sort
View
JOT
2010
144views more  JOT 2010»
13 years 6 months ago
REquirements, Aspects and Software Quality: the REASQ model
Object-oriented analysis and design have been more concerned with system functionality, neglecting non-functional aspects; the result is code which is tangled and difficult to main...
Isi Castillo, Francisca Losavio, Alfredo Matteo, J...
NORDSEC
2009
Springer
14 years 8 days ago
Security Usability of Petname Systems
Abstract. To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to man...
Md. Sadek Ferdous, Audun Jøsang, Kuldeep Si...
CSCW
2004
ACM
14 years 1 months ago
Retrofitting collaboration into UIs with aspects
Mission critical applications and legacy systems may be difficult to revise and rebuild, and yet it is sometimes desirable to retrofit their user interfaces with new collaborative...
Li-Te Cheng, Steven L. Rohall, John F. Patterson, ...
APSEC
2006
IEEE
13 years 9 months ago
Using Operational Architecture to Model Embedded Software
Almost methods in embedded software modeling take software architecture as one of the crucial parts of the design process. Since a principal role of embedded software is the inter...
Sang-Uk Jeon, Jang-Eui Hong, Doo-Hwan Bae
ECBS
1999
IEEE
138views Hardware» more  ECBS 1999»
14 years 22 hour ago
Multi-Domain Surety Modeling and Analysis for High Assurance Systems
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
James Davis, Jason Scott, Janos Sztipanovits, Marc...