Mostrando 3 resultados de: 3
Filtros aplicados
Publisher
ACM International Conference Proceeding Series(1)
Communications in Computer and Information Science(1)
WSEAS Transactions on Systems(1)
Área temáticas
Física aplicada(2)
Ciencias de la computación(1)
Derecho privado(1)
Fuerzas aéreas y otras fuerzas especializadas(1)
Programación informática, programas, datos, seguridad(1)
Área de conocimiento
Ingeniería de software(2)
Enhanced misuse cases for prioritization of security requirements
Conference ObjectAbstract: Nowadays, it is impossible to ignore the implementation of security features in information systemsPalabras claves:Misuse case, prioritization, requirement engineering, Software Engineering, Use caseAutores:Kim J., Sang Guun Yoo, Vaca H.P.Fuentes:googlescopusSoftware architecture of JTAG security system
ArticleAbstract: The issue of JTAG security has recently become of interest not only to academic researchers but alsoPalabras claves:JTAG, RUP, security, Software architectureAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusSecurity requirements prioritization based on threat modeling and valuation graph
Conference ObjectAbstract: Information systems manage assets that are critical for the business processes of organizations. ThePalabras claves:Security Requirement Prioritization, Threat modelingAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopus