Sciweavers

5475 search results - page 4 / 1095
» Model Driven Security
Sort
View
111
Voted
ICEIS
2010
IEEE
15 years 2 months ago
A Contract-based Event Driven Model for Collaborative Security in Financial Information Systems
Roberto Baldoni, Giorgia Lodi, Gregory Chockler, E...
153
Voted
ISSE
2010
15 years 3 months ago
URDAD as a semi-formal approach to analysis and design
The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object M...
Fritz Solms, Dawid Loubser
ICWS
2010
IEEE
15 years 6 months ago
A Pattern-Driven Generation of Security Policies for Service-Oriented Architectures
Service-oriented Architectures support the provision, discovery, and usage of services in different application contexts. The Web Service specifications provide a technical founda...
Michael Menzel, Robert Warschofsky, Christoph Mein...
ICSE
2007
IEEE-ACM
16 years 5 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 11 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich