Sciweavers

77 search results - page 4 / 16
» New Software Development Paradigms and Possible Adoption for...
Sort
View
KBSE
2005
IEEE
15 years 3 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
FSE
2004
Springer
125views Cryptology» more  FSE 2004»
15 years 1 months ago
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
ded abstract of this paper appears in Fast Software Encryption, FSE 2004, Lecture Notes in Computer Science, W. Meier and B. Roy editors, Springer-Verlag, 2004. This is the full ve...
Tetsu Iwata, Tadayoshi Kohno
JUCS
2010
159views more  JUCS 2010»
14 years 4 months ago
Developing a Secure Mobile Grid System through a UML Extension
: The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as th...
David G. Rosado, Eduardo Fernández-Medina, ...
ACSAC
2007
IEEE
15 years 4 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo
MBUI
2004
121views User Interface» more  MBUI 2004»
14 years 11 months ago
Towards Usable Analysis, Design and Modeling Tools
In this paper, we discuss the issues preventing adoption of analysis, design and modeling (AMD) software development tools. We argue that AMD tools are experiencing the same probl...
Nuno Jardim Nunes, Pedro F. Campos