Sciweavers

1352 search results - page 5 / 271
» Designing Security Requirements Models Through Planning
Sort
View
AAAI
2000
14 years 11 months ago
Adaptive User Interfaces through Dynamic Design Automation
The inherent difficulty in supporting human usability in large control systems--such as building environmental and security systems--derives from the large diversity of components...
Robin R. Penner, Erik S. Steinmetz, Christopher L....
PRIMA
2007
Springer
15 years 3 months ago
Supporting Requirements Analysis in Tropos: A Planning-Based Approach
Abstract. Software systems are becoming more and more part of human life influencing organizational and social activities. This introduces the need of considering the design of a ...
Volha Bryl, Paolo Giorgini, John Mylopoulos
PADS
2005
ACM
15 years 3 months ago
Requirements on Worm Mitigation Technologies in MANETS
This study presents an analysis of the impact of mitigation on computer worm propagation in Mobile Ad-hoc Networks (MANETS). According to the recent DARPA BAA Defense Against Cybe...
Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andr...
CRITIS
2007
14 years 11 months ago
Modeling and Simulating Information Security Management
Security Management is a complex task. It requires several interconnected activities: designing, implementing and maintaining a robust technical infrastructure, developing suitable...
Jose Maria Sarriegi, Javier Santos, Jose M. Torres...
TSE
2008
107views more  TSE 2008»
14 years 9 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...