Sciweavers

674 search results - page 13 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
AIRWEB
2005
Springer
15 years 3 months ago
Blocking Blog Spam with Language Model Disagreement
We present an approach for detecting link spam common in blog comments by comparing the language models used in the blog post, the comment, and pages linked by the comments. In co...
Gilad Mishne, David Carmel, Ronny Lempel
INFSOF
2006
160views more  INFSOF 2006»
14 years 9 months ago
B-SCP: A requirements analysis framework for validating strategic alignment of organizational IT based on strategy, context, and
Ensuring that organizational IT is in alignment with and provides support for an organization's business strategy is critical to business success. Despite this, business stra...
Steven J. Bleistein, Karl Cox, June M. Verner, Kei...
DSRT
2008
IEEE
15 years 4 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
15 years 2 months ago
Coordination analysis: a method for deriving use cases from process dependencies
Despite the widespread recognition that information technology (IT) and business process are tightly connected, existing system design methods provide limited guidance on how to t...
Xiang Michelle Liu, George M. Wyner
99
Voted
IJNSEC
2008
190views more  IJNSEC 2008»
14 years 9 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid