Sciweavers

16 search results - page 2 / 4
» A Methodology for Assessing Procedural Security: A Case Stud...
Sort
View
ICST
2008
IEEE
14 years 5 days ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
ISI
2005
Springer
13 years 11 months ago
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
Abstract. The Internet which has enabled global businesses to flourish has become the very same channel for mushrooming ‘terrorist news networks.’ Terrorist organizations and t...
Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc...
BIOSURVEILLANCE
2007
Springer
13 years 12 months ago
Assessing Seasonal Variation in Multisource Surveillance Data: Annual Harmonic Regression
A significant proportion of human diseases, spanning the gamut from viral respiratory disease to arthropod-borne macroparasitic infections of the blood, exhibit distinct and stable...
Eric Lofgren, Nina Fefferman, Meena Doshi, Elena N...
ECBS
2007
IEEE
145views Hardware» more  ECBS 2007»
13 years 9 months ago
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams
We present in this paper a new approach for the automatic verification and performance analysis of SysML activity diagrams. Since timeliness is important in the design and analysi...
Yosr Jarraya, Andrei Soeanu, Mourad Debbabi, Fawzi...
IEEEARES
2007
IEEE
14 years 2 days ago
From Trust to Dependability through Risk Analysis
The importance of critical systems has been widely recognized and several efforts are devoted to integrate dependability requirements in their development process. Such efforts re...
Yudistira Asnar, Paolo Giorgini, Fabio Massacci, N...