Sciweavers

3555 search results - page 4 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
UML
2005
Springer
15 years 2 months ago
Exceptional Use Cases
Many exceptional situations arise during the execution of an application. When developing dependable software, the first step is to foresee these exceptional situations and docume...
Aaron Shui, Sadaf Mustafiz, Jörg Kienzle, Chr...
PCI
2005
Springer
15 years 3 months ago
Scenario Networks: Specifying User Interfaces with Extended Use Cases
In this paper, we present the rationale and the baseline of a notation which can be used on its own or as an extension to standard UML to facilitate specification of an interactive...
Demosthenes Akoumianakis, Ioannis Pachoulakis
ACSAC
1999
IEEE
15 years 1 months ago
Tools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
SIS
2004
14 years 10 months ago
Towards a Systematic Development of Secure Systems
In this paper we outline a new process model for security engineering. This process model extends object oriented, use case driven software development by the systematic treatment ...
Ruth Breu, Klaus Burger, Michael Hafner, Gerhard P...
SAC
1994
ACM
15 years 1 months ago
Extending a parallel CLP language to support the development of multi-agent systems
An extension of Me parallel constraint logic programming language ElipSys is presented. This extension is directed towards the development of multi-agent systems which have to dea...
Panagiotis Stamatopoulos, Dimitris Margaritis, Con...