Sciweavers

1587 search results - page 68 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
105
Voted
SISW
2003
IEEE
15 years 8 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
114
Voted
WCRE
1999
IEEE
15 years 7 months ago
A Tool for Securely Integrating Legacy Systems into a Distributed Environment
Legacy systems provide services that remain useful beyond the means of the technology in which they were originally implemented. Our Legacy Wrapper tool packages the services of a...
Timothy S. Souder, Spiros Mancoridis
133
Voted
RIAO
2007
15 years 4 months ago
Exploring Interactive Information Retrieval: An Integrated Approach to Interface Design and Interaction Analysis
In this paper, we describe a novel methodology that integrates the design of the (i) user interface; (ii) interaction logger; and (iii) log analyzer. It is based on formalizing, v...
Gheorghe Muresan
100
Voted
AOSD
2004
ACM
15 years 8 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
158
Voted
I3E
2001
196views Business» more  I3E 2001»
15 years 4 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel