Sciweavers

657 search results - page 26 / 132
» Secure and Usable Requirements Engineering
Sort
View
STTT
2008
117views more  STTT 2008»
14 years 9 months ago
An approach to quality engineering of TTCN-3 test specifications
Abstract Experience with the development and maintenance of large test suites specified using the Testing and Test Control Notation (TTCN-3) has shown that it is difficult to const...
Helmut Neukirchen, Benjamin Zeiss, Jens Grabowski
ICSE
2000
IEEE-ACM
15 years 1 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine
ICWE
2004
Springer
15 years 3 months ago
Reliable and Adaptable Security Engineering for Database-Web Services
The situation in engineering security for Web services that access databases is as follows: On the one hand, specifications like WSSecurity are concerned with the security managem...
Martin Wimmer, Daniela Eberhardt, Pia Ehrnlechner,...
COMPSAC
2003
IEEE
15 years 3 months ago
A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks
Secure group communication in mobile ad hoc networks is often dynamic and impromptu, and thus requires efficient and automated secure group management and seamless combination of ...
Stephen S. Yau, Xinyu Zhang
WER
2007
Springer
15 years 3 months ago
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Faranak Farzad, Eric Yu, Patrick C. K. Hung