Sciweavers

181 search results - page 23 / 37
» Automated Verification of UMLsec Models for Security Require...
Sort
View
101
Voted
ICWE
2010
Springer
14 years 11 months ago
Business Process Compliance through Reusable Units of Compliant Processes
Compliance management is essential for ensuring that organizational business processes and supporting information systems are in accordance with a set of prescribed requirements or...
David Schumm, Oktay Türetken, Natallia Kokash...
APSCC
2008
IEEE
15 years 7 months ago
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures
Software systems today often run in malicious environments in which attacks or intrusions are quite common. This situation has brought security concerns into the development of so...
Yanguo Liu, Issa Traoré, Alexander M. Hoole
ISSE
2010
14 years 11 months ago
URDAD as a semi-formal approach to analysis and design
The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object M...
Fritz Solms, Dawid Loubser
107
Voted
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
15 years 7 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
120
Voted
SRDS
2007
IEEE
15 years 6 months ago
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
We are witnessing a revival of Storage Service Providers in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are...
Vishal Kher, Yongdae Kim