Sciweavers

4 search results - page 1 / 1
» Elaborating Security Requirements by Construction of Intenti...
Sort
View
ICSE
2004
IEEE-ACM
14 years 4 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
CCS
2007
ACM
13 years 11 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
FM
2005
Springer
98views Formal Methods» more  FM 2005»
13 years 10 months ago
Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern
The Mondex Electronic Purse system [18] is an outstanding example of formal refinement techniques applied to a genuine industrial scale application, and notably, was the first ve...
Richard Banach, Michael Poppleton, Czeslaw Jeske, ...
ICST
2009
IEEE
13 years 11 months ago
Unit Testing Non-functional Concerns of Component-based Distributed Systems
Unit testing component-based distributed systems traditionally involved testing functional concerns of the application logic throughout the development lifecycle. In contrast, tes...
James H. Hill, Hamilton A. Turner, James R. Edmond...