Sciweavers

657 search results - page 32 / 132
» Secure and Usable Requirements Engineering
Sort
View
JSS
1998
139views more  JSS 1998»
14 years 9 months ago
Human-computer interaction: Interdisciplinary roots and trends
Methodology, theory, and practice in the ®eld of Human±Computer Interaction (HCI) all share the goal of producing interactive software that can be used eciently, e€ectively, ...
H. Rex Hartson
AGENTS
2001
Springer
15 years 2 months ago
A knowledge level software engineering methodology for agent oriented programming
Our goal in this paper is to introduce and motivatea methodology, called Tropos, for building agent oriented software systems. Tropos is based on two key ideas. First, the notion ...
Paolo Bresciani, Anna Perini, Paolo Giorgini, Faus...
ICSEA
2007
IEEE
15 years 4 months ago
Making Cost Effective Security Decision with Real Option Thinking
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
Jingyue Li, Xiaomeng Su
COMPSAC
2009
IEEE
15 years 4 months ago
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
Abstract—While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data ful...
Rafael Accorsi
ICSE
2009
IEEE-ACM
14 years 7 months ago
Slede: Framework for automatic verification of sensor network security protocol implementations
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a ve...
Youssef Hanna, Hridesh Rajan