Sciweavers

674 search results - page 50 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
PERCOM
2010
ACM
14 years 8 months ago
Analysis of Quality of Surveillance in fusion-based sensor networks
—Recent years have witnessed the deployments of wireless sensor networks for mission-critical applications such as battlefield monitoring and security surveillance. These applic...
Rui Tan, Guoliang Xing, Xunteng Xu, Jianping Wang
ICSE
2004
IEEE-ACM
15 years 9 months ago
Theme: An Approach for Aspect-Oriented Analysis and Design
Aspects are behaviours that are tangled and scattered across a system. In requirements documentation, aspects manifest themselves as descriptions of behaviours that are intertwine...
Elisa L. A. Baniassad, Siobhán Clarke
JCS
1998
117views more  JCS 1998»
14 years 9 months ago
A Semantic-Based Transaction Processing Model for Multilevel Transactions
Multilevel transactions have been proposed for multilevel secure databases; in contrast to most proposals, such transactions allow users to read and write across multiple security...
Indrakshi Ray, Paul Ammann, Sushil Jajodia
ASIACRYPT
2009
Springer
15 years 4 months ago
Security Notions and Generic Constructions for Client Puzzles
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...
WCE
2007
14 years 11 months ago
Performing Early Feasibility Studies of Software Development Projects Using Business Process Models
—A new approach to perform feasibility studies using business process models is proposed. The utilization of the improved Role Activity Diagram notations has led to the extractio...
Ayman Issa, Faisal A. Abu Rub