• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 26,416
Next 10 →

SECURITY REQUIREMENTS

by Michael N. Johnstone, Michael N. Johnstone , 2011
"... Modelling misuse cases as a means of capturing security requirements ..."
Abstract - Add to MetaCart
Modelling misuse cases as a means of capturing security requirements

Security Requirements for

by H. Cruickshank, P. Pillai, M. Noisternig, S. Iyengar , 2009
"... the Unidirectional Lightweight Encapsulation (ULE) Protocol ..."
Abstract - Add to MetaCart
the Unidirectional Lightweight Encapsulation (ULE) Protocol

Engineering Security Requirements

by Donald G. Firesmith, Firesmith Consulting - Journal of Object Technology , 2003
"... Most requirements engineers are poorly trained to elicit, analyze, and specify security requirements, often confusing them with the architectural security mechanisms that are traditionally used to fulfill them. They thus end up specifying architecture and design constraints rather than true security ..."
Abstract - Cited by 49 (3 self) - Add to MetaCart
Most requirements engineers are poorly trained to elicit, analyze, and specify security requirements, often confusing them with the architectural security mechanisms that are traditionally used to fulfill them. They thus end up specifying architecture and design constraints rather than true

A Security Architecture for Computational Grids

by Ian Foster , Carl Kesselman, Gene Tsudik, Steven Tuecke , 1998
"... State-of-the-art and emerging scientific applications require fast access to large quantities of data and commensurately fast computational resources. Both resources and data are often distributed in a wide-area network with components administered locally and independently. Computations may involve ..."
Abstract - Cited by 568 (47 self) - Add to MetaCart
involve hundreds of processes that must be able to acquire resources dynamically and communicate e#ciently. This paper analyzes the unique security requirements of large-scale distributed (grid) computing and develops a security policy and a corresponding security architecture. An implementation

A Secure Routing Protocol for Ad Hoc Networks

by Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer , 2002
"... Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distin ..."
Abstract - Cited by 508 (0 self) - Add to MetaCart
with distinct security requirements. We propose a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Our protocol, ARAN, is based on certificates and successfully defeats all identified attacks.

Experiences in Eliciting Security Requirements

by unknown authors
"... Alargely neglected area in requirements engineering is that of elicitation methods for security requirements. Many organizations, if they use an elicitation method at all for security requirements, use one that they have previously used for ordinary, functional (end-user) requirements. Alternatively ..."
Abstract - Add to MetaCart
Alargely neglected area in requirements engineering is that of elicitation methods for security requirements. Many organizations, if they use an elicitation method at all for security requirements, use one that they have previously used for ordinary, functional (end-user) requirements

The Integration of Safety and Security Requirements

by David Peter Eames, Jonathan Moffett - Proceedings of the 18th International Conference on Computer Safety, Reliability and Security , 1999
"... . This paper investigates safety and security requirements specification methods, and proposed techniques for the integration of contrasting methodologies. The nature of interaction between safety and security requirements, and problems relating to their independent development, are discussed. T ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
. This paper investigates safety and security requirements specification methods, and proposed techniques for the integration of contrasting methodologies. The nature of interaction between safety and security requirements, and problems relating to their independent development, are discussed

Universally composable security: A new paradigm for cryptographic protocols

by Ran Canetti , 2013
"... We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved ..."
Abstract - Cited by 833 (37 self) - Add to MetaCart
We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols

Security Threats and Security Requirements for the

by Request Comments, France Telecom, S. De Cnodder , 2010
"... The Access Node Control Protocol (ANCP) aims to communicate Quality of Service (QoS)-related, service-related, and subscriber-related configurations and operations between a Network Access Server (NAS) and an Access Node (e.g., a Digital Subscriber Line Access Multiplexer (DSLAM)). The main goal of ..."
Abstract - Add to MetaCart
, with the aim of deciding which security functions are required. Based on this, security requirements regarding the Access Node Control Protocol are defined.

Building Security Requirements with CLASP

by John Viega
"... Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements. In this paper, we show how to build security requirements in a structured manner that is conduciv ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements. In this paper, we show how to build security requirements in a structured manner
Next 10 →
Results 1 - 10 of 26,416
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University