-
1
-
-
72249098337
-
A client-based privacy manager for cloud computing
-
New York, NY, USA: ACM
-
M. Mowbray and S. Pearson, "A client-based privacy manager for cloud computing," in COMSWARE '09: Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE. New York, NY, USA: ACM, 2009, pp. 1-8.
-
(2009)
COMSWARE '09: Proceedings of the Fourth International ICST Conference on COMmunication System SoftWAre and MiddlewaRE
, pp. 1-8
-
-
Mowbray, M.1
Pearson, S.2
-
2
-
-
80051977782
-
Creating HIPAA-compliant medical data applications with amazon web services
-
Amazon Web Services April
-
Amazon Web Services, "Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services," Amazon Web Services, Tech. Rep., April 2009.
-
(2009)
Amazon Web Services, Tech. Rep.
-
-
-
4
-
-
84985008410
-
The architecture tradeoff analysis method
-
CA: IEEE Computer Society
-
R. Kazman, M. Klein, M. Barbacci, T. Longstaff, H. Lipson, and J. Carriere, "The architecture tradeoff analysis method," in Proceedings of the Fourth IEEE International Conference on Engineering of Complex Computer Systems (ICECCS). Monterey, CA: IEEE Computer Society, 1998, pp. 68-78.
-
(1998)
Proceedings of the Fourth IEEE International Conference on Engineering of Complex Computer Systems (ICECCS). Monterey
, pp. 68-78
-
-
Kazman, R.1
Klein, M.2
Barbacci, M.3
Longstaff, T.4
Lipson, H.5
Carriere, J.6
-
5
-
-
77954606482
-
Using implied scenarios in security testing
-
New York, NY, USA: ACM
-
S. Al-Azzani and R. Bahsoon, "Using implied scenarios in security testing," in SESS '10: Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems. New York, NY, USA: ACM, 2010, pp. 15-21.
-
(2010)
SESS '10: Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
, pp. 15-21
-
-
Al-Azzani, S.1
Bahsoon, R.2
-
6
-
-
18944390715
-
Comparison of scenario-based software architecture evaluation methods
-
Proceedings - 11th Asia-Pacific Software Engineering Conference, APSEC 2004
-
M. A. Babar and I. Gorton, "Comparison of scenario-based software architecture evaluation methods," in APSEC '04: Proceedings of the 11th Asia-Pacific Software Engineering Conference. Washington, DC, USA: IEEE Computer Society, 2004, pp. 600-607. (Pubitemid 40700564)
-
(2004)
Proceedings - Asia-Pacific Software Engineering Conference, APSEC
, pp. 600-607
-
-
Babar, M.A.1
Gorton, I.2
-
7
-
-
0003680794
-
ATAM: Method for architecture evaluation
-
Carnegie Mellon University August
-
R. Kazman, M. Klein, and P. Clements, "ATAM: Method for Architecture Evaluation," Carnegie Mellon University, Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, Tech. Rep., August 2000.
-
(2000)
Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, Tech. Rep.
-
-
Kazman, R.1
Klein, M.2
Clements, P.3
-
8
-
-
0042689501
-
Toward a discipline of scenario-based architectural engineering
-
R. Kazman, S. J. Carrière, and S. G. Woods, "Toward a discipline of scenario-based architectural engineering," Ann. Softw. Eng., vol. 9, no. 1-4, pp. 5-33, 2000.
-
(2000)
Ann. Softw. Eng.
, vol.9
, Issue.1-4
, pp. 5-33
-
-
Kazman, R.1
Carrière, S.J.2
Woods, S.G.3
-
9
-
-
0035783704
-
Detecting implied scenarios in message sequence chart specifications
-
S. Uchitel, J. Kramer, and J. Magee, "Detecting implied scenarios in message sequence chart specifications," in ESEC/FSE-9: Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering. New York, NY, USA: ACM, 2001, pp. 74-82. (Pubitemid 35466912)
-
(2001)
Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering
, pp. 74-82
-
-
Uchitel, S.1
Kramer, J.2
Magee, J.3
-
10
-
-
35248867837
-
LTSA-MSC: Tool support for behaviour model elaboration using implied scenarios
-
S. Uchitel, R. Chatley, J. Kramer, and J. Magee, "Ltsa-msc: tool support for behaviour model elaboration using implied scenarios," in TACAS'03: Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems. Berlin, Heidelberg: Springer-Verlag, 2003, pp. 597-601. (Pubitemid 137638659)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2619
, pp. 597-601
-
-
Uchitel, S.1
Chatley, R.2
Kramer, J.3
Magee, J.4
-
11
-
-
77950515732
-
Semi-automated detection of architectural threats for security testing
-
New York, NY, USA: ACM
-
S. Al-Azzani and R. Bahsoon, "Semi-automated detection of architectural threats for security testing," in ESEC/FSE Doctoral Symposium '09: Proceedings of the doctoral symposium for ESEC/FSE on Doctoral symposium. New York, NY, USA: ACM, 2009, pp. 25-26.
-
(2009)
ESEC/FSE Doctoral Symposium '09: Proceedings of the Doctoral Symposium for ESEC/FSE on Doctoral Symposium
, pp. 25-26
-
-
Al-Azzani, S.1
Bahsoon, R.2
-
12
-
-
70449775106
-
Security characterization for evaluation of software architectures using atam
-
ICICT '09. International Conference on, aug.
-
A. Raza, H. Abbas, L. Yngstrom, and A. Hemani, "Security characterization for evaluation of software architectures using atam," in Information and Communication Technologies, 2009. ICICT '09. International Conference on, aug. 2009, pp. 241-246.
-
(2009)
Information and Communication Technologies, 2009
, pp. 241-246
-
-
Raza, A.1
Abbas, H.2
Yngstrom, L.3
Hemani, A.4
-
13
-
-
70349089573
-
Data protection utilizing trusted platform module
-
New York, NY, USA: ACM
-
E. Vila and P. Borovska, "Data protection utilizing trusted platform module," in CompSysTech '08: Proceedings of the 9th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing. New York, NY, USA: ACM, 2008, pp. V.13-1.
-
(2008)
CompSysTech '08: Proceedings of the 9th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
-
-
Vila, E.1
Borovska, P.2
-
14
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
15
-
-
2942530486
-
A framework for classifying and comparing software architecture evaluation methods
-
DC, USA: IEEE Computer Society
-
M. A. Babar, L. Zhu, and R. Jeffery, "A framework for classifying and comparing software architecture evaluation methods," in ASWEC '04: Proceedings of the 2004 Australian Software Engineering Conference. Washington, DC, USA: IEEE Computer Society, 2004, p. 309.
-
(2004)
ASWEC '04: Proceedings of the 2004 Australian Software Engineering Conference. Washington
, pp. 309
-
-
Babar, M.A.1
Zhu, L.2
Jeffery, R.3
-
16
-
-
0036036577
-
Security attribute evaluation method: A cost-benefit approach
-
S. A. Butler, "Security attribute evaluation method: a cost-benefit approach," in Proceedings of the 24th International Conference on Software Engineering, ser. ICSE '02. New York, NY, USA: ACM, 2002, pp. 232-240. [Online]. Available: http://doi.acm.org/10.1145/581339.581370 (Pubitemid 35009113)
-
(2002)
Proceedings - International Conference on Software Engineering
, pp. 232-240
-
-
Butler, S.A.1
-
17
-
-
47849092849
-
Making cost effective security decision with real option thinking
-
DC, USA: IEEE Computer Society Online
-
J. Li and X. Su, "Making cost effective security decision with real option thinking," in Proceedings of the International Conference on Software Engineering Advances. Washington, DC, USA: IEEE Computer Society, 2007, pp. 14-. [Online]. Available: http://portal.acm.org/citation.cfm?id=1304609. 1306415
-
(2007)
Proceedings of the International Conference on Software Engineering Advances. Washington
, pp. 14
-
-
Li, J.1
Su, X.2
-
18
-
-
70449809535
-
Tracking requirements and threats for secure software development
-
New York, NY, USA: ACM
-
B. Malone and A. Siraj, "Tracking requirements and threats for secure software development," in ACM-SE 46: Proceedings of the 46th Annual Southeast Regional Conference on XX. New York, NY, USA: ACM, 2008, pp. 278-281.
-
(2008)
ACM-SE 46: Proceedings of the 46th Annual Southeast Regional Conference on XX
, pp. 278-281
-
-
Malone, B.1
Siraj, A.2
-
19
-
-
78049344241
-
Reviewing product line architectures: Experience report of atam in an automotive context
-
F. van der Linden, Ed. Springer Berlin / Heidelberg
-
S. Ferber, P. Heidl, and P. Lutz, "Reviewing product line architectures: Experience report of atam in an automotive context," in Software Product-Family Engineering, ser. Lecture Notes in Computer Science, F. van der Linden, Ed. Springer Berlin / Heidelberg, 2002, vol. 2290, pp. 194-197.
-
(2002)
Software Product-family Engineering, ser. Lecture Notes in Computer Science
, vol.2290
, pp. 194-197
-
-
Ferber, S.1
Heidl, P.2
Lutz, P.3
-
20
-
-
79959406243
-
An ontology-driven software architecture evaluation method
-
New York, NY, USA: ACM
-
A. Erfanian and F. Shams Aliee, "An ontology-driven software architecture evaluation method," in SHARK '08: Proceedings of the 3rd international workshop on Sharing and reusing architectural knowledge. New York, NY, USA: ACM, 2008, pp. 79-86.
-
(2008)
SHARK '08: Proceedings of the 3rd International Workshop on Sharing and Reusing Architectural Knowledge
, pp. 79-86
-
-
Erfanian, A.1
Shams Aliee, F.2
-
21
-
-
36248952589
-
Making decisions in integration of automotive software and electronics: A method based on atam and ahp
-
Washington, DC, USA: IEEE Computer Society
-
P. Wallin, J. Froberg, and J. Axelsson, "Making decisions in integration of automotive software and electronics: A method based on atam and ahp," in SEAS '07: Proceedings of the 4th International Workshop on Software Engineering for Automotive Systems. Washington, DC, USA: IEEE Computer Society, 2007, p. 5.
-
(2007)
SEAS '07: Proceedings of the 4th International Workshop on Software Engineering for Automotive Systems
, pp. 5
-
-
Wallin, P.1
Froberg, J.2
Axelsson, J.3
-
22
-
-
51849152394
-
Extending atam to assess product line architecture
-
CIT 2008. 8th IEEE International Conference on, jul.
-
T. Kim, I. Y. Ko, S. W. Kang, and D. H. Lee, "Extending atam to assess product line architecture," in Computer and Information Technology, 2008. CIT 2008. 8th IEEE International Conference on, jul. 2008, pp. 790-797.
-
(2008)
Computer and Information Technology, 2008
, pp. 790-797
-
-
Kim, T.1
Ko, I.Y.2
Kang, S.W.3
Lee, D.H.4
-
23
-
-
71249122803
-
Analysis of van-core system architecture - A case study of applying the atam
-
SNPD '09. 10th ACIS International Conference on, may.
-
J. Lee, S. Kang, H. Chun, B. Park, and C. Lim, "Analysis of van-core system architecture - a case study of applying the atam," in Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing, 2009. SNPD '09. 10th ACIS International Conference on, may. 2009, pp. 358-363.
-
(2009)
Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing, 2009
, pp. 358-363
-
-
Lee, J.1
Kang, S.2
Chun, H.3
Park, B.4
Lim, C.5
-
24
-
-
33750552785
-
Extending the ATAM architecture evaluation to product line architectures
-
DOI 10.1109/WICSA.2005.33, 1620090, Proceedings - 5th Working IEEE/IFIP Conference on Software Architecture, WICSA 2005
-
F. Olumofin and V. Misic, "Extending the atam architecture evaluation to product line architectures," in Software Architecture, 2005. WICSA 2005. 5th Working IEEE/IFIP Conference on, 2005, pp. 45-56. (Pubitemid 46401925)
-
(2005)
Proceedings - 5th Working IEEE/IFIP Conference on Software Architecture, WICSA 2005
, vol.2005
, pp. 45-56
-
-
Olumofin, F.G.1
Misic, V.B.2
-
25
-
-
44449129407
-
Sensitivity analysis for a scenario-based reliability prediction model
-
New York, NY, USA: ACM
-
G. N. Rodrigues, D. S. Rosenblum, and S. Uchitel, "Sensitivity analysis for a scenario-based reliability prediction model," in WADS '05: Proceedings of the 2005 workshop on Architecting dependable systems. New York, NY, USA: ACM, 2005, pp. 1-5.
-
(2005)
WADS '05: Proceedings of the 2005 Workshop on Architecting Dependable Systems
, pp. 1-5
-
-
Rodrigues, G.N.1
Rosenblum, D.S.2
Uchitel, S.3
|