Sciweavers

180 search results - page 2 / 36
» A lightweight technique for assessing risks in requirements ...
Sort
View
ASIASIM
2004
Springer
13 years 12 months ago
A Security Risk Analysis Model for Information Systems
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...
QSIC
2005
IEEE
14 years 2 days ago
Ontology Based Requirements Analysis: Lightweight Semantic Processing Approach
We propose a software requirements analysis method based on domain ontology technique, where we can establish a mapping between a software requirements specification and the doma...
Haruhiko Kaiya, Motoshi Saeki
ICPP
2008
IEEE
14 years 28 days ago
On the Design of Fast Pseudo-Random Number Generators for the Cell Broadband Engine and an Application to Risk Analysis
Numerical simulations in computational physics, biology, and finance, often require the use of high quality and efficient parallel random number generators. We design and optimi...
David A. Bader, Aparna Chandramowlishwaran, Virat ...
SIGSOFT
2008
ACM
14 years 7 months ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
13 years 8 months ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...