Sciweavers

674 search results - page 26 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
ECBS
2005
IEEE
160views Hardware» more  ECBS 2005»
15 years 3 months ago
Traceability-Driven Model Refinement for Test Case Generation
Testing complex Computer-Based Systems is not only a demanding but a very critical task. Therefore the use of models for generating test data is an important goal. Tool support du...
Matthias Riebisch, Michael Hübner
CONCUR
2008
Springer
14 years 11 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
GLOBECOM
2008
IEEE
14 years 9 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
ATAL
2003
Springer
15 years 2 months ago
Modelling secure multiagent systems
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requ...
Haralambos Mouratidis, Paolo Giorgini, Gordon A. M...
ICCBSS
2005
Springer
15 years 3 months ago
Using Goals and Quality Models to Support the Matching Analysis During COTS Selection
The selection process is a crucial activity of the development of COTS-based systems. A key step of the evaluation of COTS components carried out during selection is the matching b...
Carina Alves, Xavier Franch, Juan Pablo Carvallo, ...