Sciweavers

501 search results - page 3 / 101
» SoSPa: A system of Security design Patterns for systematical...
Sort
View
CSI
2007
96views more  CSI 2007»
13 years 5 months ago
A common criteria based security requirements engineering process for the development of secure information systems
In order to develop security critical Information Systems, specifying security quality requirements is vitally important, although it is a very difficult task. Fortunately, there ...
Daniel Mellado, Eduardo Fernández-Medina, M...
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
13 years 9 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
ETRICS
2006
13 years 9 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
DEXAW
2007
IEEE
111views Database» more  DEXAW 2007»
13 years 11 months ago
A Security Engineering Process based on Patterns
We present a security engineering process based on security problem frames and concretized security problem frames. Both kinds of frames constitute patterns for analyzing security...
Denis Hatebur, Maritta Heisel, Holger Schmidt