咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 软件工程
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 2 篇 security require...
  • 2 篇 formal methods a...
  • 2 篇 security and pri...
  • 1 篇 safety requireme...
  • 1 篇 business process...
  • 1 篇 human-centered c...
  • 1 篇 visualization
  • 1 篇 acm ccs
  • 1 篇 graph drawings
  • 1 篇 applied computin...
  • 1 篇 enterprise compu...
  • 1 篇 visualization te...
  • 1 篇 procedural model
  • 1 篇 business
  • 1 篇 acm css

机构

  • 1 篇 pacific northwes...
  • 1 篇 inst comp sci j ...

作者

  • 1 篇 matulevicius rai...
  • 1 篇 ahmed naved
  • 1 篇 jones rebecca
  • 1 篇 tate lucas

语言

  • 2 篇 英文
检索条件"主题词=Formal methods and theory of security"
2 条 记 录,以下是1-10 订阅
排序:
Eliciting security Requirements from the Business Processes Using security Risk-Oriented Patterns
收藏 引用
IT-INFORMATION TECHNOLOGY 2013年 第6期55卷 225-230页
作者: Matulevicius, Raimundas Ahmed, Naved Inst Comp Sci J Liivi 2 EE-50409 Tartu Estonia
Although importance of aligning modelling of business processes and security is growing, there is rather limited research performed on elicitation of security requirements from the business processes. In this paper we... 详细信息
来源: 评论
Visualizing Comparisons of Bill of Materials
Visualizing Comparisons of Bill of Materials
收藏 引用
20th IEEE Symposium on Visualization for Cyber security (VizSec)
作者: Jones, Rebecca Tate, Lucas Pacific Northwest Natl Lab Richland WA 99352 USA
The complexity of distributed manufacturing and software development coupled with the increasing prevalence of cyber and supply chain attacks necessitates a greater understanding of the hardware and software component... 详细信息
来源: 评论