Sciweavers

193 search results - page 5 / 39
» An Aspect-Oriented Approach to Security Requirements Analysi...
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Privacy Requirements Implemented with a JavaCard
Privacy is extremely important in healthcare systems. Unfortunately, most of the solutions already deployed are developed empirically. After discussing some of such existing solut...
Anas Abou El Kalam, Yves Deswarte
ENTCS
2006
158views more  ENTCS 2006»
14 years 9 months ago
Towards a Subject-Oriented Model-Driven Framework
Model-Driven Architecture is an approach of the OMG, its objective is to tackle problems such as: the high availability that a software product requires to be ready for use, the h...
Pablo Amaya, Carlos González, Juan M. Muril...
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
15 years 4 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
IPPS
2000
IEEE
15 years 1 months ago
A Requirements Analysis for Parallel KDD Systems
Abstract. The current generation of data mining tools have limited capacity and performance, since these tools tend to be sequential. This paper explores a migration path out of th...
William Maniatty, Mohammed Javeed Zaki
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 4 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...