Sciweavers

674 search results - page 18 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
BMCBI
2007
119views more  BMCBI 2007»
14 years 9 months ago
Conceptual-level workflow modeling of scientific experiments using NMR as a case study
Background: Scientific workflows improve the process of scientific experiments by making computations explicit, underscoring data flow, and emphasizing the participation of humans...
Kacy K. Verdi, Heidi J. C. Ellis, Michael R. Gryk
INFSOF
2007
83views more  INFSOF 2007»
14 years 9 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
EDOC
2004
IEEE
15 years 1 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...
IFM
1999
Springer
15 years 1 months ago
Integration Problems in Telephone Feature Requirements
The feature interaction problem is prominent in telephone service development. Through a number of case studies, we have discovered that no single semantic framework is suitable f...
J. Paul Gibson, Geoff Hamilton, Dominique Mé...
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
15 years 3 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...