Sciweavers

390 search results - page 17 / 78
» Security Requirements Engineering for Evolving Software Syst...
Sort
View
SISW
2003
IEEE
15 years 2 months ago
Memories: A Survey of Their Secure Uses in Smart Cards
— Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (...
Michael Neve, Eric Peeters, David Samyde, Jean-Jac...
CBSE
2010
Springer
15 years 1 months ago
Restructuring Object-Oriented Applications into Component-Oriented Applications by Using Consistency with Execution Traces
Abstract. Software systems should evolve in order to respond to changing client requirements and their evolving environments. But unfortunately, the evolution of legacy application...
Simon Allier, Houari A. Sahraoui, Salah Sadou, St&...
ISSRE
2010
IEEE
14 years 7 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
SEKE
2007
Springer
15 years 3 months ago
A Model-driven Approach to Architecting Secure Software
A software architecture provides a high-level description of a software solution in terms of the structure, topology, and interactions between its principal components. While a nu...
Ebenezer A. Oladimeji, Sam Supakkul, Lawrence Chun...
ISSE
2010
14 years 7 months ago
An integrated multi-view model evolution framework
A UML model of a software system can be represented by a sequence of model transformations, starting from an empty model. To effectively support the design of complex systems, tra...
Volker Stolz