Sciweavers

2518 search results - page 3 / 504
» Using Communication Objects During Requirements Analysis
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 4 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
ICARCV
2008
IEEE
168views Robotics» more  ICARCV 2008»
14 years 21 days ago
Force/moment sensing during sliding motion using a micro sensor embedded in a soft fingertip
—We have investigated the deformation of a soft fingertip when it slides. This process was first simulated using ANSYS software with non-linear Finite Element Analysis (FEA). B...
Van Anh Ho, Dzung Viet Dao, Susumu Sugiyama, Shini...
RE
2006
Springer
13 years 6 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
AOSD
2004
ACM
13 years 11 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
IFM
1999
Springer
13 years 10 months ago
Integration Problems in Telephone Feature Requirements
The feature interaction problem is prominent in telephone service development. Through a number of case studies, we have discovered that no single semantic framework is suitable f...
J. Paul Gibson, Geoff Hamilton, Dominique Mé...