Sciweavers

44 search results - page 3 / 9
» Requirements Reuse for Improving Information Systems Securit...
Sort
View
ITCC
2005
IEEE
13 years 11 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
SOCO
2005
Springer
13 years 11 months ago
Improving Composition Support with Lightweight Metadata-Based Extensions of Component Models
Software systems that rely on the component paradigm build new components by assembling existing prefabricated components. Most currently available IDEs support graphical component...
Johann Oberleitner, Michael Fischer
CCS
2009
ACM
13 years 10 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
IHI
2010
197views Healthcare» more  IHI 2010»
13 years 18 days ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
ICSE
1993
IEEE-ACM
13 years 9 months ago
Formal Approaches to Software Architecture
Over the past 15 years there has been increasing recognition that careful attention to the design of a system’s software architecture is critical to satisfying its requirements ...
David Garlan