Sciweavers

674 search results - page 15 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 3 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
EDOC
2009
IEEE
15 years 26 days ago
A Goal-Oriented Requirements Modelling Language for Enterprise Architecture
Methods for enterprise architecture, such as TOGAF, acknowledge the importance of requirements engineering in the development of enterprise architectures. Modelling support is nee...
Dick A. C. Quartel, Wilco Engelsman, Henk Jonkers,...
INAP
2001
Springer
15 years 2 months ago
Towards Reconciling Use Cases via Controlled Language and Graphical Models
Abstract. In requirements engineering use cases are employed to describe the ow of events and the occurrence of states in a future information system. Use cases consist of a set of...
Kathrin Böttger, Rolf Schwitter, Diego Moll&a...
CLEIEJ
2006
110views more  CLEIEJ 2006»
14 years 9 months ago
Requirements Engineering Contributions on the Development of Educational Software for the Blind or People with Impaired Vision -
: This paper presents an account of the experience observed when obtaining a set of requirements for the development of educational software for people with impaired vision. Numero...
Victor Francisco Araya Santander, Dorisvaldo Rodri...
73
Voted
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 4 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard