Sciweavers

341 search results - page 10 / 69
» A Security Engineering Process based on Patterns
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten
APSEC
1999
IEEE
15 years 4 months ago
Software Development Based on Software Pattern Evolution
This paper discusses a technique to model software patternsfor supporting pattern based software development. Software development can be considered as the evolution of the artifa...
Takashi Kobayashi, Motoshi Saeki
82
Voted
ICSE
2003
IEEE-ACM
15 years 11 months ago
An Experience-Based Approach for Integrating Architecture and Requirements Engineering
Deriving requirements and architecture in concert implies the joint elicitation and specification of the problem and the structure of the solution. In this paper we argue that suc...
Adam Trendowicz, Allen H. Dutoit, Antje von Knethe...
OTM
2007
Springer
15 years 5 months ago
OntoCase - A Pattern-Based Ontology Construction Approach
As the technologies facilitating the Semantic Web become more and more mature they are also adopted by the business world. When developing semantic applications, constructing the u...
Eva Blomqvist
B
2007
Springer
15 years 3 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet