Sciweavers

674 search results - page 35 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
ER
2009
Springer
316views Database» more  ER 2009»
15 years 1 months ago
XMI2USE: A Tool for Transforming XMI to USE Specifications
Abstract. The UML-based Specification Environment (USE) tool supports the syntactic analysis, type checking, consistency checking, and dynamic validation of invariants and pre-/pos...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
WCRE
2009
IEEE
15 years 4 months ago
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis
Feature models are widely employed in domainspecific software development to specify the domain requirements with commonality and variability. A feature model is usually construct...
Yiming Yang, Xin Peng, Wenyun Zhao
ER
2000
Springer
139views Database» more  ER 2000»
15 years 1 months ago
Semantic Analysis Patterns
The development of object-oriented software starts from requirements expressed commonly as Use Cases. The requirements are then converted into a conceptual or analysis model. Analy...
Eduardo B. Fernández, Xiaohong Yuan
CORR
2010
Springer
131views Education» more  CORR 2010»
14 years 7 months ago
On Modelling and Analysis of Dynamic Reconfiguration of Dependable Real-Time Systems
This paper motivates the need for a formalism for the modelling and analysis of dynamic reconfiguration of dependable real-time systems. We present requirements that the formalism ...
Manuel Mazzara, Anirban Bhattacharyya
PET
2005
Springer
15 years 3 months ago
An Analysis of Parallel Mixing with Attacker-Controlled Inputs
Parallel mixing [7] is a technique for optimizing the latency of a synchronous re-encryption mix network. We analyze the anonymity of this technique when an adversary can learn the...
Nikita Borisov