Sciweavers

1587 search results - page 9 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
SERP
2004
14 years 11 months ago
Using UML in a Risk-Driven Development Process
Risk-driven development focus on identifying and treating risks as an integrated part of the development process. One then obtain an adequate security level by treating security i...
Siv Hilde Houmb, Ørjan Markhus Lillevik
ICECCS
2002
IEEE
99views Hardware» more  ICECCS 2002»
15 years 2 months ago
Using Role-Based Modeling Language (RBML) to Characterize Model Families
Cost-effective development of large, integrated computer-based systems can be realized through systematic reuse of development experiences throughout the development process. In t...
Dae-Kyoo Kim, Robert B. France, Sudipto Ghosh, Eun...
DEXAW
2007
IEEE
111views Database» more  DEXAW 2007»
15 years 4 months ago
A Security Engineering Process based on Patterns
We present a security engineering process based on security problem frames and concretized security problem frames. Both kinds of frames constitute patterns for analyzing security...
Denis Hatebur, Maritta Heisel, Holger Schmidt
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
15 years 4 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
TRUSTBUS
2010
Springer
14 years 8 months ago
Context-Aware Privacy Design Pattern Selection
:  Context-Aware Privacy Design Pattern Selection Siani Pearson, Yun Shen HP Laboratories HPL-2010-74 Privacy, Design Patterns, Context Awareness User-related contextual factors...
Siani Pearson, Yun Shen