Sciweavers

488 search results - page 40 / 98
» ST-Tool: A CASE Tool for Security Requirements Engineering
Sort
View
CBSE
2009
Springer
15 years 8 months ago
Integrating Functional and Architectural Views of Reactive Systems
An integrated model-based development approach has to capture the relationship between requirements, design, and implementation models. In the requirements engineering phase, the m...
Jewgenij Botaschanjan, Alexander Harhurin
ESSOS
2011
Springer
14 years 5 months ago
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Philippe De Ryck, Lieven Desmet, Wouter Joosen
DAC
2004
ACM
16 years 2 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
OOPSLA
2000
Springer
15 years 5 months ago
Finding refactorings via change metrics
Reverse engineering is the process of uncovering the design and the design rationale from a functioning software system. Reverse engineering is an integral part of any successful ...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...
ICSE
2007
IEEE-ACM
15 years 7 months ago
Agility and Experimentation: Practical Techniques for Resolving Architectural Tradeoffs
This paper outlines our experiences with making architectural tradeoffs between performance, availability, security, and usability, in light of stringent cost and time-to-market c...
T. C. Nicholas Graham, Rick Kazman, Chris Walmsley