AbstractThe problem of effectively designing and analyzing software to realize non-functional requirements is an important research topic. The significant benefits of such work include detecting and removing defects earlier, reducing development time and cost while improving the system’s quality. The Formal Design Analysis Framework (FDAF) is an aspect-oriented approach that supports the design and analysis of multiple non-functional properties for distributed, real-time systems. In this paper, a security attribute, data origin authentication, is defined as a reusable aspect based on its security pattern definition. The FDAF provides a UML extension to weave the security aspect into a UML architecture design. This is accomplished by abstrac...
Project (M.S., Computer Science) -- California State University, Sacramento, 2009.Designing the soft...
Design time analysis is an important step in the process of developing software systems, with the go...
International audienceThere is a wide range of security solutions on cyber-physical systems, most ai...
AbstractThe problem of effectively designing and analyzing software to realize non-functional requir...
AbstractMuch attention has recently been focused on the problem of effectively developing software s...
Non-functional properties, key criteria in determining the success of a software system, need to be ...
AbstractThe vision, strategies, and goals of enterprises involve numerous security issues; these ste...
Abstract—The vision, strategies, and goals of enterprises involve numerous security issues; these st...
The increasing complexity of software systems entails large effort to jointly analyze their non-fun...
The increasing complexity of software systems entails large effort to jointly analyze their non-func...
Aspect-oriented modeling (AOM) allows software designers to describe features that address pervasive...
The focus of the paper is on the analysis of performance effects of different security solutions mod...
The focus of the paper is on the analysis of performance effects of different security solutions mod...
Developers of critical systems need to address several quality properties, such as security and perf...
Software security is becoming increasingly invasive in all aspects of a software application but the...
Project (M.S., Computer Science) -- California State University, Sacramento, 2009.Designing the soft...
Design time analysis is an important step in the process of developing software systems, with the go...
International audienceThere is a wide range of security solutions on cyber-physical systems, most ai...
AbstractThe problem of effectively designing and analyzing software to realize non-functional requir...
AbstractMuch attention has recently been focused on the problem of effectively developing software s...
Non-functional properties, key criteria in determining the success of a software system, need to be ...
AbstractThe vision, strategies, and goals of enterprises involve numerous security issues; these ste...
Abstract—The vision, strategies, and goals of enterprises involve numerous security issues; these st...
The increasing complexity of software systems entails large effort to jointly analyze their non-fun...
The increasing complexity of software systems entails large effort to jointly analyze their non-func...
Aspect-oriented modeling (AOM) allows software designers to describe features that address pervasive...
The focus of the paper is on the analysis of performance effects of different security solutions mod...
The focus of the paper is on the analysis of performance effects of different security solutions mod...
Developers of critical systems need to address several quality properties, such as security and perf...
Software security is becoming increasingly invasive in all aspects of a software application but the...
Project (M.S., Computer Science) -- California State University, Sacramento, 2009.Designing the soft...
Design time analysis is an important step in the process of developing software systems, with the go...
International audienceThere is a wide range of security solutions on cyber-physical systems, most ai...