Sciweavers

597 search results - page 16 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
SIGSOFT
2002
ACM
15 years 10 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
79
Voted
IMC
2006
ACM
15 years 3 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
64
Voted
RE
2007
Springer
14 years 9 months ago
Using obstacle analysis to identify contingency requirements on an unpiloted aerial vehicle
This paper describes the use of Obstacle Analysis to identify anomaly handling requirements for a safety-critical, autonomous system. The software requirements for the system evolv...
Robyn R. Lutz, Ann Patterson-Hine, Stacy Nelson, C...
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
14 years 11 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
ASWEC
2005
IEEE
15 years 3 months ago
Deriving Systems Level Security Properties of Component Based Composite Systems
This paper proposes an approach of defining systemslevel security properties of component-based composite systems. It argues that the security properties of a composite system ca...
Khaled M. Khan, Jun Han