Sciweavers

591 search results - page 29 / 119
» Embracing policy engineering
Sort
View
IJISEC
2006
88views more  IJISEC 2006»
14 years 9 months ago
Requirements engineering for trust management: model, methodology, and reasoning
Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizatio...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
SEW
2006
IEEE
15 years 3 months ago
Qualitative Modeling for Requirements Engineering
Acquisition of “quantitative” models of sufficient accuracy to enable effective analysis of requirements tradeoffs is hampered by the slowness and difficulty of obtaining su...
Tim Menzies, Julian Richardson
CCR
2004
79views more  CCR 2004»
14 years 9 months ago
Reverse engineering the Internet
To provide insight into Internet operation and performance, recent efforts have measured various aspects of the Internet, developing and improving measurement tools in the process....
Neil T. Spring, David Wetherall, Thomas E. Anderso...
SACMAT
2009
ACM
15 years 4 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
IEEECIT
2010
IEEE
14 years 8 months ago
Caching Strategy on Mobile Rich Media Engine
With the increasing development of mobile rich media applications, it has become an important research topic on how to reduce application response time so as to run more smoothly ...
Xin Min, Jixian Zhang, Lei Luo