Sciweavers

1587 search results - page 22 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
FSKD
2005
Springer
78views Fuzzy Logic» more  FSKD 2005»
15 years 3 months ago
Using Feedback Cycle for Developing an Adjustable Security Design Metric
In this paper, we develop a security design metric that can be used at system design time to build more secure systems. This metric is based on the system-wide approach and adopt a...
Charlie Y. Shim, Jung Y. Kim, Sung Y. Shin, Jiman ...
OOPSLA
1998
Springer
15 years 2 months ago
Role Model Based Framework Design and Integration
Today, any large object-oriented software system is built using frameworks. Yet, designing frameworks and defining their interaction with clients remains a difficult task. A prima...
Dirk Riehle, Thomas R. Gross
COMPSEC
2006
143views more  COMPSEC 2006»
14 years 9 months ago
A novel approach for computer security education using Minix instructional operating system
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
Wenliang Du, Mingdong Shang, Haizhi Xu
DSRT
2008
IEEE
15 years 4 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
BNCOD
2003
150views Database» more  BNCOD 2003»
14 years 11 months ago
Multilevel Secure Rules and Its Impact on the Design of Active Database Systems
The event-condition-action paradigm (also known as triggers or rules) gives a database “active” capabilities – the ability to react automatically to changes in the database o...
Indrakshi Ray