Sciweavers

946 search results - page 66 / 190
» Software engineering for security: a roadmap
Sort
View
AOSD
2004
ACM
15 years 3 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
ICAIL
2007
ACM
15 years 1 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
FASE
2007
Springer
15 years 4 months ago
Software Product Families: Towards Compositionality
- Static Analysis and Abstract Interpretation I (Chair: Sophia Drossopulou, room: Multicert) • FASE - Specification (Chair: Marsha Chechik, room: Cisco) • TACAS - Specificati...
Jan Bosch
WWW
2010
ACM
15 years 4 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
CODES
2005
IEEE
15 years 3 months ago
Microcoded coprocessor for embedded secure biometric authentication systems
We design and implement a cryptographic biometric authentication system using a microcoded architecture. The secure properties of the biometric matching process are obtained by me...
Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhe...