Sciweavers

488 search results - page 24 / 98
» ST-Tool: A CASE Tool for Security Requirements Engineering
Sort
View
COMPSAC
2003
IEEE
15 years 2 months ago
A Security Characterisation Framework for Trustworthy Component Based Software Systems
This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framewo...
Khaled M. Khan, Jun Han
ICSE
2005
IEEE-ACM
15 years 9 months ago
An empirical evaluation of test case filtering techniques based on exercising complex information flows
Some software defects trigger failures only when certain complex information flows occur within the software. Profiling and analyzing such flows therefore provides a potentially i...
David Leon, Wes Masri, Andy Podgurski
I3E
2001
196views Business» more  I3E 2001»
14 years 11 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
RE
2005
Springer
15 years 3 months ago
Do Viewpoints Lead to Better Conceptual Models? An Exploratory Case Study
The use of viewpoints has long been proposed as a technique to structure evolving requirements models. In theory, viewpoints should provide better stakeholder traceability, and th...
Steve M. Easterbrook, Eric S. K. Yu, Jorge Aranda,...
CARS
2003
14 years 11 months ago
Does incorrect computer prompting affect human decision making? A case study in mammography
The goal of the data collection and analyses described in this paper was to investigate the effects of incorrect output from a CAD tool on the reliability of the decisions of its ...
Eugenio Alberdi, Andrey Povyakalo, Lorenzo Strigin...