Sciweavers

902 search results - page 35 / 181
» Security and Trust Requirements Engineering
Sort
View
DISCEX
2003
IEEE
15 years 3 months ago
MYSEA Technology Demonstration
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanis...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
CSE
2009
IEEE
15 years 4 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
SEKE
2007
Springer
15 years 3 months ago
Real-Time Trust Management in Agent Based Online Auction Systems
Agent based online auctions have not yet become popular because they are not trustable. One of the major concerns in agent based online auctions is the shilling behavior problem, w...
Rinkesh Patel, Haiping Xu, Ankit Goel
ICICS
2005
Springer
15 years 3 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
RE
2004
Springer
15 years 3 months ago
Quantifying Non-Functional Requirements: A Process Oriented Approach
In this work, we propose a framework for quantifying non-functional requirements (NFRs). This framework uses quality characteristics of the execution domain, application domain an...
Raquel L. Hill, Jun Wang, Klara Nahrstedt