Sciweavers

1587 search results - page 17 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
SAC
2004
ACM
15 years 3 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
CHIMIT
2008
ACM
14 years 11 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
COMPSAC
2009
IEEE
15 years 2 months ago
Tool Support for Design Pattern Recognition at Model Level
Given the rapid rise of model-driven software development methodologies, it is highly desirable that tools be developed to support the use of design patterns in this context. This...
Hong Zhu, Ian Bayley, Lijun Shan, Richard Amphlett
VOTEID
2007
Springer
15 years 3 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
DAGSTUHL
2003
14 years 11 months ago
Pattern Synthesis from Multiple Scenarios for Parameterized Real-Time UML Models
Abstract. The continuing trend towards more sophisticated technical applications results in an increasing demand for high quality software for complex, safety-critical systems. Des...
Holger Giese, Florian Klein, Sven Burmester