Sciweavers

5475 search results - page 4 / 1095
» Model Driven Security
Sort
View
68
Voted
ICEIS
2010
IEEE
14 years 10 months ago
A Contract-based Event Driven Model for Collaborative Security in Financial Information Systems
Roberto Baldoni, Giorgia Lodi, Gregory Chockler, E...
ISSE
2010
14 years 10 months ago
URDAD as a semi-formal approach to analysis and design
The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object M...
Fritz Solms, Dawid Loubser
ICWS
2010
IEEE
15 years 1 months ago
A Pattern-Driven Generation of Security Policies for Service-Oriented Architectures
Service-oriented Architectures support the provision, discovery, and usage of services in different application contexts. The Web Service specifications provide a technical founda...
Michael Menzel, Robert Warschofsky, Christoph Mein...
82
Voted
ICSE
2007
IEEE-ACM
16 years 14 days ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
105
Voted
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 6 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich