Sciweavers

ISSE
2006
14 years 12 days ago
Modeling security as a dependability attribute: a refinement-based approach
Abstract As distributed, networked computing systems become the dominant computing platform in a growing range of applications, they increase opportunities for security violations ...
Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani...
ISSE
2006
14 years 12 days ago
Pattern Componentization: The Factory Example
Can Design Patterns be turned into reusable components? To help answer this question, we have performed a systematic study of the standard design patterns. One of the most ing is ...
Karine Arnout, Bertrand Meyer
ISSE
2006
14 years 12 days ago
Formalization and assessment of regulatory requirements for safety-critical software
Sergiy A. Vilkomir, Jonathan P. Bowen, Aditya K. G...
ISSE
2006
14 years 12 days ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy