Sciweavers

341 search results - page 8 / 69
» A Security Engineering Process based on Patterns
Sort
View
WER
2005
Springer
15 years 5 months ago
Multi-Perspective Requirements Engineering for Networked Business Systems: A Framework for Pattern Composition
How business and software analysts explore, document, and negotiate requirements for enterprise systems is critical to the benefits their organizations will eventually derive. In t...
Zlatko Zlatev, Maya Daneva, Roel Wieringa
SERP
2007
15 years 1 months ago
Software Engineering Design Patterns for Relational Databases
– The use of design patterns such as the GRASP (General Responsibility Assignment Software Principles) or GoF (Gang-of-Four) patterns in software engineering has been well-docume...
Cyril S. Ku, Thomas J. Marlowe, Tatyana Budanskaya...
CAISE
2009
Springer
15 years 6 months ago
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the S...
Haralambos Mouratidis, Ali Sunyaev, Jan Jürje...
ENTCS
2010
154views more  ENTCS 2010»
14 years 9 months ago
Process Algebra with Hooks for Models of Pattern Formation
We introduce Process Algebra with Hooks (PAH). In PAH processes represent different layers action, from biochemistry to tissue, and special synchronisations via hook actions ensur...
Andrea Degasperi, Muffy Calder
APSEC
2003
IEEE
15 years 4 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens