Sciweavers

341 search results - page 12 / 69
» A Security Engineering Process based on Patterns
Sort
View
102
Voted
ETRICS
2006
15 years 3 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
88
Voted
XPU
2004
Springer
15 years 5 months ago
The Oregon Software Development Process
Abstract. User participation is still a difficult topic in software development. Based on the results of the Oregon experiment in construction we propose a novel development proces...
Till Schümmer, Robert Slagter
SIGOPSE
2004
ACM
15 years 5 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
WER
1999
Springer
15 years 3 months ago
A Requirements Elicitation Approach Based in Templates and Patterns
One of the main problems of requirements elicitation is expressing customer requirements in a form that can be understood not only by requirements engineers but also by noncomputer...
Amador Durán Toro, B. Bernárdez Jim&...
ISI
2006
Springer
14 years 11 months ago
Strategic Intelligence Analysis: From Information Processing to Meaning-Making
Strategic intelligence involves the efforts to understand the "Big Picture" emerging from data sources. Concerning textual data, this process involves the extraction of m...
Yair Neuman, Liran Elihay, Meni Adler, Yoav Goldbe...