Showing 1 - 10 of 10
In today’s business environment it is difficult to obtain senior management approval forthe expenditure of valuable resources to “guarantee “that a potentially disastrous event will not occurthat could affect the organisation performance. Analysing potential risk and the allocation...
Persistent link: https://www.econbiz.de/10009463254
Artificial Neural Networks (ANNs) have been used in a wide variety ofapplication sectors from credit card fraud detection to transportation. Over the last twodecades many algorithms have been applied in the areas of classification, association,prediction and filtering of data. Such systems would...
Persistent link: https://www.econbiz.de/10009463255
The term security assurance has been used in the computer science literature to express theconfidence that one has in the strength of the security measures. The need for a methodology tomeasure current security assurance levels of a system has been reported in the literature as vital inorder to...
Persistent link: https://www.econbiz.de/10009463259
Security is an important issue when developing complex information systems, however very little work has been done in integrating security concerns during the analysis of information systems. Current methodologies fail to adequately integrate security and systems engineering, basically because...
Persistent link: https://www.econbiz.de/10009463261
This is an early version of Mouratidis, H., Giorgin, P. (2007) “Using Security Attack Scenarios to Analyse Security During the Information Systems Design” paper presented in the 6th International Conference on Enterprise Information Systems (ICEIS), Porto – Portugal, ICEIS (3), 2004, pp....
Persistent link: https://www.econbiz.de/10009463262
Although security plays an important role in the development of multiagent systems, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. One of the reasons is the fact that agent oriented...
Persistent link: https://www.econbiz.de/10009463263
In today's world, where most of the critical infrastructures are based on distributed systems, security failures have become very common, even within large corporations. A system with security loopholes can be damaging for companies, both in terms of reputation and finances, while customers are...
Persistent link: https://www.econbiz.de/10009463264
Security is a major target for today’s information systems (IS) designers. Security modelling languages exist to reason on security in the early phases of IS development, when the most crucial design decisions are made. Reasoning on security involves analysing risk, and effectively...
Persistent link: https://www.econbiz.de/10009463265
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the Secure Tropos methodology, which provides an approach for security requirements elicitation, and the UMLsec approach,...
Persistent link: https://www.econbiz.de/10009463266
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. This is, mainly, due to the fact that agent oriented...
Persistent link: https://www.econbiz.de/10009463267