Sciweavers

674 search results - page 23 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
IEEEARES
2009
IEEE
14 years 7 months ago
Software Inspections Using Guided Checklists to Ensure Security Goals
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the syste...
Frank Elberzhager, Alexander Klaus, Marek Jawurek
110
Voted
DGO
2011
277views Education» more  DGO 2011»
13 years 9 months ago
Application of the MINOE regulatory analysis framework: case studies
In this paper, we describe a tool to help holistically understand, research and analyze the relationship between an ecosystem model and the relevant laws. Specifically, a software...
Julia A. Ekstrom, Gloria T. Lau, Kincho H. Law, Ma...
ICTAC
2005
Springer
15 years 3 months ago
Stochastic Analysis of Graph Transformation Systems: A Case Study in P2P Networks
In distributed and mobile systems with volatile bandwidth and fragile connectivity, non-functional aspects like performance and reliability become more and more important. To forma...
Reiko Heckel
UML
2001
Springer
15 years 2 months ago
Estimating Software Development Effort Based on Use Cases-Experiences from Industry
Use case models are used in object-oriented analysis for capturing and describing the functional requirements of a system. Several methods for estimating software development effor...
Bente Anda, Hege Dreiem, Dag I. K. Sjøberg,...
SOCO
2008
Springer
14 years 9 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot