Sciweavers

341 search results - page 6 / 69
» A Security Engineering Process based on Patterns
Sort
View
IEEEARES
2007
IEEE
15 years 5 months ago
Web Engineering Security: Essential Elements
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essent...
William Bradley Glisson, Ray Welland
SACMAT
2003
ACM
15 years 4 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
SERA
2010
Springer
14 years 10 months ago
Process Patterns for MDA-Based Software Development
—Information systems are expected to satisfy increasingly ambitious requirements, while reducing time–to–market has become a primary objective. This trend has necessitated th...
Mohsen Asadi, Naeem Esfahani, Raman Ramsin
OOPSLA
2005
Springer
15 years 5 months ago
Pattern transformation for two-dimensional separation of concerns
Design patterns are applied in software development to decouple individual concerns, so that a change in a design decision is isolated to one location of the code base. However, m...
Xiaoqing Wu
IDEAS
2008
IEEE
153views Database» more  IDEAS 2008»
15 years 6 months ago
Pattern based processing of XPath queries
As the popularity of areas including document storage and distributed systems continues to grow, the demand for high performance XML databases is increasingly evident. This has le...
Gerard Marks, Mark Roantree