Sciweavers

571 search results - page 3 / 115
» On Exploiting System Dynamics Modeling to Identify Service R...
Sort
View
ER
2009
Springer
166views Database» more  ER 2009»
14 years 9 days ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
ISSRE
2010
IEEE
13 years 4 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
KI
2008
Springer
13 years 5 months ago
On Restaurants and Requirements: How Requirements Engineering may be Facilitated by Scripts
Requirements engineering is a central part of software projects. It is assumed that two third of all errors in software projects are caused by forgotten requirements or mutual misu...
Christoph Peylo
RTS
2010
90views more  RTS 2010»
13 years 4 months ago
A timeband framework for modelling real-time systems
Abstract Complex real-time systems, must integrate physical processes with digital control, human operation and organizational structures. New scientific foundations are required ...
Alan Burns, Ian J. Hayes
FAST
2011
12 years 9 months ago
The SCADS Director: Scaling a Distributed Storage System Under Stringent Performance Requirements
Elasticity of cloud computing environments provides an economic incentive for automatic resource allocation of stateful systems running in the cloud. However, these systems have t...
Beth Trushkowsky, Peter Bodík, Armando Fox,...