We present a security engineering process based on security problem frames and concretized security problem frames. Both kinds of frames constitute patterns for analyzing security...
Modern distributed information systems handle increasingly critical data and computation, but there is no systematic way to assess whether a given part of the system can be entrus...
Partha Pratim Pal, Franklin Webber, Michael Atighe...
We present a technique for specifying coverage criteria and a method for generating test suites for systems whose behaviours can be described as extended finite state machines (EF...
Johan Blom, Anders Hessel, Bengt Jonsson, Paul Pet...
Workers in organizations frequently request help from assistants by sending request messages that express information intent: an intention to update data in an information system....
This paper investigates how to "observe" a planar object being pushed by a finger. The pushing is governed by a nonlinear system that relates through contact the object ...