Sciweavers

Share
1419 search results - page 1 / 284
» Designing Security Requirements Models Through Planning
Sort
View
CAISE
2006
Springer
10 years 3 months ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
RE
2005
Springer
10 years 5 months ago
Modeling Security Requirements Through Ownership, Permission and Delegation
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
ER
2009
Springer
166views Database» more  ER 2009»
10 years 6 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
ITRUST
2005
Springer
10 years 5 months ago
ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements
ST-Tool is a graphical tool integrating an agent-oriented requirements engineering methodology with tools for the formal analysis of models. Essentially, the tool allows designers ...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, A...
ENVSOFT
2016
44views more  ENVSOFT 2016»
4 years 7 months ago
Paradigm shift to enhanced water supply planning through augmented grids, scarcity pricing and adaptive factory water: A system
: This paper details a system dynamics model developed to simulate proposed changes to water governance through the integration of supply, demand and asset management processes. To...
Oz Sahin, Raymond S. Siems, Rodney A. Stewart, Mic...
books