Sciweavers

410 search results - page 25 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
14 years 2 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
WCE
2007
13 years 8 months ago
Performing Early Feasibility Studies of Software Development Projects Using Business Process Models
—A new approach to perform feasibility studies using business process models is proposed. The utilization of the improved Role Activity Diagram notations has led to the extractio...
Ayman Issa, Faisal A. Abu Rub
BIOSURVEILLANCE
2007
Springer
14 years 1 months ago
Assessing Seasonal Variation in Multisource Surveillance Data: Annual Harmonic Regression
A significant proportion of human diseases, spanning the gamut from viral respiratory disease to arthropod-borne macroparasitic infections of the blood, exhibit distinct and stable...
Eric Lofgren, Nina Fefferman, Meena Doshi, Elena N...
ESORICS
2009
Springer
14 years 8 months ago
Towards a Theory of Accountability and Audit
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means to enforce authorization policies. In this paper, we describe an operational model of ...
Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, Jam...
ICSE
2009
IEEE-ACM
13 years 5 months ago
Security Test Generation Using Threat Trees
Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...