Sciweavers

902 search results - page 24 / 181
» Security and Trust Requirements Engineering
Sort
View
CCS
2007
ACM
15 years 3 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
DEXAW
2007
IEEE
111views Database» more  DEXAW 2007»
15 years 4 months ago
A Security Engineering Process based on Patterns
We present a security engineering process based on security problem frames and concretized security problem frames. Both kinds of frames constitute patterns for analyzing security...
Denis Hatebur, Maritta Heisel, Holger Schmidt
104
Voted
SPC
2005
Springer
15 years 3 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
WER
2005
Springer
15 years 3 months ago
Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce
This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method in...
Simara Vieira da Rocha, Zair Abdelouahab, Eduardo ...
WWW
2004
ACM
15 years 10 months ago
Trust-serv: model-driven lifecycle management of trust negotiation policies for web services
A scalable approach to trust negotiation is required in Web service environments that have large and dynamic requester populations. We introduce Trust-Serv, a model-driven trust n...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati