Sciweavers

488 search results - page 50 / 98
» ST-Tool: A CASE Tool for Security Requirements Engineering
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 3 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
COMPSAC
2009
IEEE
15 years 6 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
SEMWIKI
2008
156views Data Mining» more  SEMWIKI 2008»
15 years 1 months ago
A Generic Corporate Ontology Lifecycle
Abstract. Weaving the Semantic Web the research community is working on publishing publicly available data sources as RDF data on the Web. To facilitate the adoption of Semantic We...
Markus Luczak-Rösch, Ralf Heese
CBMS
2008
IEEE
15 years 6 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
AGENTS
2001
Springer
15 years 4 months ago
Representing social structures in UML
From a software engineering perspective, agent systems are a specialization of object-oriented (OO) systems, in which individual objects have their own threads of control and thei...
H. Van Dyke Parunak, James Odell