Sciweavers

1976 search results - page 161 / 396
» Application Semiotics Engineering Process
Sort
View
DBSEC
2010
123views Database» more  DBSEC 2010»
15 years 3 months ago
Evaluating the Risk of Adopting RBAC Roles
We propose a framework to evaluate the risk incurred when managing users and permissions through RBAC. The risk analysis framework does not require roles to be defined, thus making...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
COMPSAC
2006
IEEE
15 years 9 months ago
Just Enough Requirements Traceability
Even though traceability is legally required in most safety critical software applications and is a recognized component of many software process improvement initiatives, organiza...
Jane Cleland-Huang
WOSP
2000
ACM
15 years 8 months ago
How system architectures impede interoperability
Interoperability problems arise when complex software systems are constructed by integrating distinct, and often heterogeneous, components. By performing interoperability analysis...
Leigh A. Davis, Jamie Payton, Rose F. Gamble
KBSE
1997
IEEE
15 years 8 months ago
Interactive Component-Based Software Development with Espresso
There are a number of competing component models in use today. Most are language-independent, but also platform-dependent and not designed to support a tool-based development para...
T. Faison
140
Voted
EDBTW
2006
Springer
15 years 5 months ago
Change Management in Large-Scale Enterprise Information Systems
The information infrastructure in today's businesses consists of many interoperating autonomous systems. Changes to a single system can therefore have an unexpected impact on ...
Boris Stumm