• Aucun résultat trouvé

[PDF] Top 20 Guiding the selection of security patterns based on security requirements and pattern classification

Has 10000 "Guiding the selection of security patterns based on security requirements and pattern classification" found on our website. Below are the top 20 most common "Guiding the selection of security patterns based on security requirements and pattern classification".

Guiding the selection of security patterns based on security requirements and pattern classification

Guiding the selection of security patterns based on security requirements and pattern classification

... Laboratory of Model Driven Engineering for Embedded Systems, F 91191, Gif-sur-Yvette JEAN-MICHEL BRUEL, IRIT (Institut de Recherche en Informatique de Toulouse), University of Toulouse Security ... Voir le document complet

18

Guiding the selection of security patterns based on security requirements and pattern classification

Guiding the selection of security patterns based on security requirements and pattern classification

... Guiding the selection of security patterns based in security risk management • 1:15 ACM Transactions on EuroPLoP 2015, ...Concrete patterns: Finally, it is ... Voir le document complet

19

Guiding the selection of security patterns for real-time systems

Guiding the selection of security patterns for real-time systems

... 8. Security solution alternatives generated from the pattern system The timing and placement parameters of the used security patterns are showed in Table ... Voir le document complet

11

Guiding the selection of security patterns for real-time systems

Guiding the selection of security patterns for real-time systems

... ONCLUSION The paper presents a model-based approach for evaluating security solution alternatives against real-time ...requirements. The approach is applied to a SCADA system case study ... Voir le document complet

12

Towards the integration of security patterns in UML Component-based Applications

Towards the integration of security patterns in UML Component-based Applications

... during the integration process were due to the fact it is part of global MDE process for securing system ...composed of several phases: (1) risk analysis, (2) pattern selection ... Voir le document complet

6

A security pattern classification based on Data integration

A security pattern classification based on Data integration

... issues and contributions Alvi et al. outlined 24 pattern catalogues and classifications in [2] and estab- lished a comparative study to point out their positive and negative ...29 ... Voir le document complet

26

Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies

Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies

... Application of our methodology 3.1 Step1: Problem context and initial requirement analysis The initial step of our approach allows analysing the security problem context ... Voir le document complet

5

Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies

Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies

... protecting the integrity and availability of the monitored ...Hence, the aircraft network security design must ensure a trusted transmission of parameters from the ... Voir le document complet

4

Pattern-based requirements development

Pattern-based requirements development

... how patterns could be used in order to generate refinements ...One of our major concern is to produce Event-B machines such that the user can refine them ...temporal/timed and resource ... Voir le document complet

11

A Practical Way of Testing Security Patterns

A Practical Way of Testing Security Patterns

... digitalised security bases, documents and papers have been proposed to guide developers in these activi- ...instance, the CAPEC base makes publicly avail- able around 1000 attack descriptions, ... Voir le document complet

8

Development of the Unified Security Requirements of PUFs During the Standardization Process

Development of the Unified Security Requirements of PUFs During the Standardization Process

... life-cycle The usual steps involved in the life-cycle of a PUF are depicted in ...for the exemplar use-cases presented in Sec. 2.3 . The design must first be realized, and then ... Voir le document complet

19

A Model-based Repository of Security and Dependability Patterns for Trusted RCES

A Model-based Repository of Security and Dependability Patterns for Trusted RCES

... description of the aim of the study was given ...during the TERESA MDE workshop in Toulouse (April 2012), a 6-months evaluation was ...All the sub- jects were already ... Voir le document complet

11

Towards the weaving of the characteristics of good security requirements

Towards the weaving of the characteristics of good security requirements

... that security requirements fulfill all these quality criteria; for instance achieving both anonymity and accountability security ...identify the malicious users in case of any ... Voir le document complet

17

Interplay of Security&Dependability and Resource using Model-driven and Pattern-based Development

Interplay of Security&Dependability and Resource using Model-driven and Pattern-based Development

... S&D Pattern-based Architecture Modeling and Analysis In our context, we have identified three kind of modeling artifacts: 1 resource models to describe platforms, 2 S&D patterns to descr[r] ... Voir le document complet

10

Interplay of Security&Dependability and Resource using Model-driven and Pattern-based Development

Interplay of Security&Dependability and Resource using Model-driven and Pattern-based Development

... S&D Pattern-based Architecture Modeling and Analysis In our context, we have identified three kind of modeling artifacts: 1 resource models to describe platforms, 2 S&D patterns to descr[r] ... Voir le document complet

11

A classification methodology for security patterns to help fix software weaknesses

A classification methodology for security patterns to help fix software weaknesses

... a pattern classification expressing which patterns can be used to remove a weakness of the CWE ...precise and accurate mapping between patterns and ...in the ... Voir le document complet

9

Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach

Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach

... in the international standard IEEE ...study of security requirements engineering approaches in order to evaluate the extent to which they can support the evolution of ... Voir le document complet

7

Model-Based Real-Time Evaluation of Security Patterns: A SCADA System Case Study

Model-Based Real-Time Evaluation of Security Patterns: A SCADA System Case Study

... technologies and protocols ...TCP/IP and web browsers as interfaces). The third generation systems which are web connected are integrated with an interface to second generation ...guarantying ... Voir le document complet

18

An engineering process for security patterns application in component based models

An engineering process for security patterns application in component based models

... Component based systems; Security patterns; Process; Aspects; SPEM ...software security pattern [1] is defined as a generic well defined security solution proposed by software ... Voir le document complet

7

Model-Based Real-Time Evaluation of Security Patterns: A SCADA System Case Study

Model-Based Real-Time Evaluation of Security Patterns: A SCADA System Case Study

... technologies and protocols ...TCP/IP and web browsers as interfaces). The third generation systems which are web connected are integrated with an interface to second generation ...guarantying ... Voir le document complet

17

Show all 10000 documents...