Engineering secure systems: Models, patterns and empirical validation
نویسندگان
چکیده
منابع مشابه
Building Secure Systems using Model-Based Engineering and Architectural Models
John Morley [email protected] A system designer faces several challenges when specifying security for distributed computing environments or migrating systems to a new execution platform. Business stakeholders impose constraints due to cost, timeto-market requirements, productivity impact, customer satisfaction concerns, and the like. And users exercise power at the desktop over computing reso...
متن کاملValidation and application of empirical shear wave velocity models based on standard penetration test
Shear wave velocity is a basic engineering tool required to define dynamic properties of soils. In many instances it may be preferable to determine Vs indirectly by common in-situ tests, such as the Standard Penetration Test. Many empirical correlations based on the Standard Penetration Test are broadly classified as regression techniques. However, no rigorous procedure has been published for c...
متن کاملnumerical versus empirical models for estimating wetting patterns in subsurface drip irrigation systems
optimal use of water resources is essential to decrease cost and maximize available water resources. subsurface drip irrigation can increase irrigation and water use efficiency. this irrigation method distributes water into the soil, leaving the surface of the soil dry and decreasing evaporation. in the design of subsurface drip irrigation (sdi) systems, the dimensions of the wetted onion deter...
متن کاملEmpirical Research in Systems Engineering:
This paper aims to advance the pedagogy of systems engineering by identifying opportunities and challenges in empirical research in the field. After an introduction to how empirical research could be further utilized in systems engineering, this paper discusses challenges faced when conducting empirical research in systems engineering, threats to validity associated with systems engineering dat...
متن کاملSecure Software Systems Engineering: The Secure Tropos Approach (Invited Paper)
This paper discusses the secure Tropos methodology. This is the first paper in the literature that discusses all the aspects of the methodology as it has evolved over the last 10 years. In particular, the paper discusses the Secure Tropos modeling language, the security aware process of the methodology, and it also introduces the secTro, an automated tool to support the methodology.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2018
ISSN: 0167-4048
DOI: 10.1016/j.cose.2018.03.016