Sciweavers

410 search results - page 2 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
SOUPS
2005
ACM
13 years 10 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
ISORC
1999
IEEE
13 years 9 months ago
Applying Use Cases for the Requirements Validation of Component-Based Real-Time Software
Component-based software development is a promising way to improve quality, time to market and handle the increasing complexity of software for real-time systems. In this paper th...
Wolfgang Fleisch
CRITIS
2007
13 years 6 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
PADS
2005
ACM
13 years 11 months ago
Requirements on Worm Mitigation Technologies in MANETS
This study presents an analysis of the impact of mitigation on computer worm propagation in Mobile Ad-hoc Networks (MANETS). According to the recent DARPA BAA Defense Against Cybe...
Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andr...
SAFECOMP
2000
Springer
13 years 8 months ago
Controlling Requirements Evolution: An Avionics Case Study
This paper presents an empirical investigation of the control of requirements evolution in an avionics safety-critical system. Metrics can be used to manage (e.g., control and pred...
Stuart Anderson, Massimo Felici