Sciweavers

3555 search results - page 164 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
EUROCRYPT
2012
Springer
13 years 6 months ago
Malleable Proof Systems and Applications
sion of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as Report 2012/012. Malleability ...
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya...
AOIS
2003
15 years 5 months ago
Towards a More Expressive and Refinable Multiagent System Engineering Methodology
In this paper, we improve and extend the MaSE methodology to bridge the gaps in this methodology. First, we propose an improvement process and, based on this process, we report th...
Shiva Vafadar, Ahmad Abdollahzadeh Barfouroush, Mo...
ICSE
2009
IEEE-ACM
15 years 1 months ago
Security Test Generation Using Threat Trees
Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...
ISSRE
2010
IEEE
15 years 2 months ago
Detecting Dependences and Interactions in Feature-Oriented Design
—Feature-oriented software development (FOSD) aims at the construction, customization, and synthesis of large-scale software systems. We propose a novel software design paradigm,...
Sven Apel, Wolfgang Scholz, Christian Lengauer, Ch...
JEI
2008
128views more  JEI 2008»
15 years 3 months ago
Practical use of receiver operating characteristic analysis to assess the performances of defect detection algorithms
Defect detection in images is a current task in quality control and is often integrated in partially or fully automated systems. Assessing the performances of defect detection algo...
Yann Le Meur, Jean-Michel Vignolle, Jocelyn Chanus...