Sciweavers

657 search results - page 84 / 132
» Secure and Usable Requirements Engineering
Sort
View
USS
2008
15 years 5 days ago
Digital Objects as Passwords
Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of gener...
Mohammad Mannan, Paul C. van Oorschot
OOPSLA
2009
Springer
15 years 4 months ago
Scalable nonblocking concurrent objects for mission critical code
The high degree of complexity and autonomy of future robotic space missions, such as Mars Science Laboratory (MSL), poses serious challenges in assuring their reliability and efļ¬...
Damian Dechev, Bjarne Stroustrup
SACMAT
2009
ACM
15 years 4 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
KBSE
2007
IEEE
15 years 4 months ago
Extracting rights and obligations from regulations: toward a tool-supported process
Security, privacy and governance are increasingly the focus of government regulations in the U.S., Europe and elsewhere. This trend has created a ā€œregulation complianceā€ probl...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
ISSTA
2006
ACM
15 years 3 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...