Sciweavers

106 search results - page 2 / 22
» Tools for Traceable Security Verification
Sort
View
ICSE
2007
IEEE-ACM
14 years 5 months ago
DECIMAL and PLFaultCAT: From Product-Line Requirements to Product-Line Member Software Fault Trees
PLFaultCAT is a tool for software fault tree analysis (SFTA) during product-line engineering. When linked with DECIMAL, a product-line requirements verification tool, the enhanced...
Josh Dehlinger, Meredith Humphrey, Lada Suvorov, P...
SAFECOMP
1998
Springer
13 years 8 months ago
Refinement of Safety-Related Hazards into Verifiable Code Assertions
: This paper presents a process for the stepwise refinement of safety code assertions from identified system hazards. The code assertions are intended for use in system safety veri...
Ken Wong, Jeff Joyce
ISICT
2003
13 years 6 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan
CCS
2007
ACM
13 years 11 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...
REFSQ
2010
Springer
13 years 2 months ago
Challenges in Aligning Requirements Engineering and Verification in a Large-Scale Industrial Context
[Context and motivation] When developing software, coordination between different organizational units is essential in order to develop a good quality product, on time and within b...
Giedre Sabaliauskaite, Annabella Loconsole, Emelie...