Sciweavers

8503 search results - page 302 / 1701
» Secure Software Architectures
Sort
View
120
Voted
JCIT
2008
102views more  JCIT 2008»
15 years 5 months ago
Architectural Patterns for Finding your
The paper discusses the innovative patterns such as subtraction, multiplication, division, task unification and attribute dependency change for evaluating the software architectur...
N. Sankar Ram, Paul Rodrigues
139
Voted
PFE
2001
Springer
15 years 9 months ago
Quality Attribute Design Primitives and the Attribute Driven Design Method
: This paper discusses the understanding of quality attributes and their application to the design of a software architecture. We present an approach to characterizing quality attr...
Leonard J. Bass, Mark Klein, Felix Bachmann
ICSE
2009
IEEE-ACM
15 years 2 months ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan
CCS
2005
ACM
15 years 10 months ago
The framework of selective interleaving functions and the modular assembly kit
The Framework of Selective Interleaving Functions and the Modular Assembly Kit for Security Properties both provide a basis for the uniform representation and formal analysis of n...
Heiko Mantel
154
Voted
IJISEC
2006
88views more  IJISEC 2006»
15 years 5 months ago
Requirements engineering for trust management: model, methodology, and reasoning
Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizatio...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...