Sciweavers

946 search results - page 46 / 190
» Software engineering for security: a roadmap
Sort
View
RE
2006
Springer
14 years 9 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
AGENTS
1999
Springer
15 years 2 months ago
A Catalog of Agent Coordination Patterns
This paper surveys the current state of the art in agentoriented software engineering, focusing on the area of coordinated multi-agent systems. In multi-agent systems, the interac...
Sandra C. Hayden, Christina Carrick, Qiang Yang
AOSD
2009
ACM
15 years 4 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
OOPSLA
2005
Springer
15 years 3 months ago
fmp and fmp2rsm: eclipse plug-ins for modeling features using model templates
Feature-based model templates have been proposed as a technique for modeling software product lines. We describe a set of tools supporting the technique, namely a feature model ed...
Krzysztof Czarnecki, Michal Antkiewicz, Chang Hwan...
INFSOF
2007
83views more  INFSOF 2007»
14 years 9 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams