Sciweavers

410 search results - page 5 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
SWS
2005
ACM
14 years 1 months ago
Web services enterprise security architecture: a case study
Web Services (WS hereafter) Security is a crucial aspect for technologies based on this paradigm to be completely adopted by the industry. As a consequence, a lot of initiatives h...
Carlos Gutiérrez, Eduardo Fernández-...
ICSE
2008
IEEE-ACM
14 years 7 months ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
RE
2001
Springer
14 years 17 hour ago
Virtual Environment Modeling for Requirements Validation of High Consequence Systems
An essential type of “evidence”of the correctness of the requirements formalization process can be provided by human-based calculation. Human calculation can be significantly ...
Victor L. Winter, Dejan Desovski, Bojan Cukic
CODES
2005
IEEE
14 years 1 months ago
High-level synthesis for large bit-width multipliers on FPGAs: a case study
In this paper, we present the analysis, design and implementation of an estimator to realize large bit width unsigned integer multiplier units. Larger multiplier units are require...
Gang Quan, James P. Davis, Siddhaveerasharan Devar...
ASE
2008
120views more  ASE 2008»
13 years 7 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone