Sciweavers

45 search results - page 1 / 9
» Model-Driven Development Meets Security: An Evaluation of Cu...
Sort
View
HICSS
2011
IEEE
247views Biometrics» more  HICSS 2011»
12 years 8 months ago
Model-Driven Development Meets Security: An Evaluation of Current Approaches
Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of considering security issues...
Kresimir Kasal, Johannes Heurix, Thomas Neubauer
CCS
2003
ACM
13 years 9 months ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce
ECMDAFA
2006
Springer
142views Hardware» more  ECMDAFA 2006»
13 years 8 months ago
Constraint Support in MDA Tools: A Survey
: The growing interest in the MDA (Model-Driven Architecture) and MDD (Model-Driven Development) approaches has largely increased the number of tools and methods including code-gen...
Jordi Cabot, Ernest Teniente
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
13 years 11 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
CLOUDCOM
2010
Springer
13 years 1 months ago
Scheduling Hadoop Jobs to Meet Deadlines
User constraints such as deadlines are important requirements that are not considered by existing cloud-based data processing environments such as Hadoop. In the current implementa...
Kamal Kc, Kemafor Anyanwu