Sciweavers

19587 search results - page 122 / 3918
» Systems Engineering for software Engineers
Sort
View
RE
2001
Springer
15 years 9 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...
SACMAT
2003
ACM
15 years 10 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
SEKE
2007
Springer
15 years 10 months ago
REM4j - A Framework for Measuring the Reverse Engineering Capability of UML CASE Tools
Reverse Engineering is becoming increasingly important in the software development world today as many organizations are battling to understand and maintain old legacy systems. To...
Steven Kearney, James F. Power
SIGDOC
1992
ACM
15 years 8 months ago
Documenting software systems with views
Softwareprofessionals rely on internaldocumentationas an aid in understanding programs. Unfortunately, the documentation for most programs is usually out-of-date and cannot be tru...
Scott R. Tilley, Hausi A. Müller, Mehmet A. O...
CORR
2010
Springer
352views Education» more  CORR 2010»
15 years 4 months ago
Case Study On Social Engineering Techniques for Persuasion
T There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working prin...
Mosin Hasan, Nilesh Prajapati, Safvan Vohara