Sciweavers

2213 search results - page 85 / 443
» Software Security
Sort
View
RE
2007
Springer
15 years 9 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
CCS
2008
ACM
15 years 5 months ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
SAFECOMP
2001
Springer
15 years 7 months ago
Project Experience with IEC 61508 and Its Consequences
The paper reports on the experiences with implementation of IEC 61508 in recent projects with European, North American and Japanese system vendors. The paper describes problems id...
Rainer Faller
AOSD
2004
ACM
15 years 8 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
ETRICS
2006
15 years 6 months ago
Optimized Workflow Authorization in Service Oriented Architectures
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...