Sciweavers

341 search results - page 13 / 69
» A Security Engineering Process based on Patterns
Sort
View
112
Voted
AMC
2007
134views more  AMC 2007»
14 years 11 months ago
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has...
Shaohui Liu, Hongxun Yao, Wen Gao, Yongliang Liu
SACMAT
2003
ACM
15 years 4 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
100
Voted
COMPSAC
2002
IEEE
15 years 4 months ago
A Dictionary-Based Compressed Pattern Matching Algorithm
Compressed pattern matching refers to the process of, given a text in a compressed form and a pattern, finding all the occurrences of the pattern in the text without decompressio...
Meng-Hang Ho, Hsu-Chun Yen
COMPSAC
2008
IEEE
15 years 6 months ago
Transformation of Legacy Software into Client/Server Applications through Pattern-Based Rearchitecturing
In this article, we address the problem of modularizing legacy applications with monolithic structure, primarily focusing on business software written in an objectoriented program...
Sascha Hunold, Matthias Korch, Björn Krellner...
93
Voted
RE
2005
Springer
15 years 5 months ago
Modeling Security Requirements Through Ownership, Permission and Delegation
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...