Sciweavers

488 search results - page 39 / 98
» ST-Tool: A CASE Tool for Security Requirements Engineering
Sort
View
ISSE
2010
14 years 10 months ago
A second look at Faster, Better, Cheaper
“Faster, Better, Cheaper” (FBC) was a systems development methodology used by NASA in the 1990s. While usually a deprecated practice, we find that, with certain caveats, it is...
Oussama El-Rawas, Tim Menzies
HICSS
2008
IEEE
130views Biometrics» more  HICSS 2008»
15 years 6 months ago
An Interview Protocol for Discovering and Assessing Collaboration Engineering Opportunities
Collaboration Engineering (CE) projects can run for months and can require substantial expenditures of effort and resources. CE is an approach to designing collaborative work prac...
Robert O. Briggs, Alanah J. Davis, John D. Murphy
TSE
2010
125views more  TSE 2010»
14 years 10 months ago
Engineering a Sound Assertion Semantics for the Verifying Compiler
—The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or...
Patrice Chalin
ER
1994
Springer
121views Database» more  ER 1994»
15 years 3 months ago
An Executable Meta Model for Re-Engineering of Database Schemas
A logical database schema, e.g. a relational one, is an implementation of a speci cation, e.g. an entity-relationship diagram. Upcoming new data models and the necessity of seamle...
Manfred A. Jeusfeld, Uwe A. Johnen
FASE
2008
Springer
15 years 1 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu