Sciweavers

137 search results - page 3 / 28
» Requirements engineering for trust management: model, method...
Sort
View
SIGSOFT
2005
ACM
14 years 6 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
OOIS
2001
Springer
13 years 9 months ago
Towards a Requirements Engineering Process Model
The creation of a development process is a challenging task. The application, customization and refinement of generic process models into fine-grained process steps suitable for a...
Armin Eberlein, Li Jiang
IAT
2010
IEEE
13 years 3 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
COMPSAC
2006
IEEE
13 years 11 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
AAAI
2000
13 years 6 months ago
The Systems Engineering Process Activities (SEPA) Methodology and Tool Suite
or cone, abstraction is chosen to represent a spectrum of user inputs/requirements that are narrowed, refined, and structured into a system design. User inputs require refinement f...
K. Suzanne Barber, Thomas J. Graser, Paul Grisham,...