Sciweavers

488 search results - page 22 / 98
» ST-Tool: A CASE Tool for Security Requirements Engineering
Sort
View
ICFEM
2003
Springer
15 years 2 months ago
Formalization, Testing and Execution of a Use Case Diagram
Abstract. Errors in a requirements model have prolonged detrimental effects on reliability, cost, and safety of a software system. It is very costly to fix these errors in later ...
Wuwei Shen, Shaoying Liu
CCS
2008
ACM
14 years 11 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
ICSE
1994
IEEE-ACM
15 years 1 months ago
Lessons from Using Basic LOTOS
We describe three case studies in the use of Basic LOTOS. The studies cover design recovery, requirements speci cation, and design activities. We also report lessons learned from ...
Mark A. Ardis
WOSP
2005
ACM
15 years 3 months ago
Performance by unified model analysis (PUMA)
Evaluation of non-functional properties of a design (such as performance, dependability, security, etc.) can be enabled by design annotations specific to the property to be evalua...
C. Murray Woodside, Dorina C. Petriu, Dorin Bogdan...
VAMOS
2007
Springer
15 years 3 months ago
KumbangSec: An Approach for Modelling Functional and Security Variability in Software Architectures
Software products often need to vary in terms of functionality, but also in terms of quality attributes. We describe KumbangSec, which in an approach for modelling functional and ...
Varvana Myllärniemi, Mikko Raatikainen, Tomi ...