Sciweavers

410 search results - page 33 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
ESSOS
2011
Springer
12 years 11 months ago
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Philippe De Ryck, Lieven Desmet, Wouter Joosen
NGC
2007
Springer
128views Communications» more  NGC 2007»
13 years 7 months ago
User-oriented Security Supporting Inter-disciplinary Life Science Research across the Grid
Abstract Understanding potential genetic factors in disease or development of personalised e-Health solutions require scientists to access a multitude of data and compute resources...
Richard O. Sinnott, Oluwafemi Ajayi, Jipu Jiang, A...
DSN
2008
IEEE
14 years 2 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
ISSE
2010
13 years 6 months ago
URDAD as a semi-formal approach to analysis and design
The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object M...
Fritz Solms, Dawid Loubser
OOPSLA
2009
Springer
14 years 2 months ago
Design pattern density defined
Design pattern density is a metric that measures how much of an object-oriented design can be understood and represented as instances of design patterns. Expert developers have lo...
Dirk Riehle