Sciweavers

6147 search results - page 79 / 1230
» Requirements, Architectures and Risks
Sort
View
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
15 years 6 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
SNPD
2008
15 years 1 months ago
Customer Value-based HW/SW Partitioning Decision in Embedded Systems
In launching a product, requirement change is always risk to an embedded system designer. Including requirements change, limited resources (e.g. development time and cost) are als...
Neunghoe Kim, Taek Lee, Dong-hyun Lee, Keun Lee, H...
HASE
2008
IEEE
15 years 29 days ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
CLOUDCOM
2009
Springer
15 years 6 months ago
A Privacy Manager for Cloud Computing
We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud comp...
Siani Pearson, Yun Shen, Miranda Mowbray
KBSE
2010
IEEE
14 years 10 months ago
Tool support for quality-driven development of software architectures
In this paper, we present a prototype tool that supports the systematic development of software architectures driven by quality requirements using architectural tactics. The tool ...
Suntae Kim, Dae-Kyoo Kim, Sooyong Park