Sciweavers

488 search results - page 52 / 98
» ST-Tool: A CASE Tool for Security Requirements Engineering
Sort
View
IEEEICCI
2002
IEEE
15 years 4 months ago
A Framework for Object Identification and Refinement Process in Object-Oriented Analysis and Design
There are already many projects focusing on Computer Aided Software Engineering (CASE) tools for object-oriented analysis and design. However, at this moment, there are certain li...
Romi S. Wahono, Behrouz H. Far
STACS
1992
Springer
15 years 3 months ago
Secure Commitment Against A Powerful Adversary
abstract Rafail Ostrovskyy Ramarathnam Venkatesanz Moti Yungx Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. S...
Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yun...
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 1 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
ISSTA
1996
ACM
15 years 4 months ago
Elements of Style: Analyzing a Software Design Feature with a Counterexample Detector
We illustrate the application of Nitpick, a specification checker, to the design of a style mechanism for a word processor. The design is cast, along with some expected properties...
Daniel Jackson, Craig Damon
WCRE
2006
IEEE
15 years 5 months ago
Mining Control Flow Graphs for Crosscutting Concerns
Aspect mining tries to identify crosscutting concerns in existing systems and thus supports the adaption to an aspect-oriented design. This paper describes an automatic static asp...
Jens Krinke