Sciweavers

597 search results - page 29 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
14 years 5 days ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
JCST
2008
94views more  JCST 2008»
13 years 7 months ago
Runtime Engine for Dynamic Profile Guided Stride Prefetching
Stride prefetching is recognized as an important technique to improve memory access performance. The prior work usually profiles and/or analyzes the program behavior offline, and u...
Qiong Zou, Xiao-Feng Li, Long-Bing Zhang
ICST
2008
IEEE
14 years 2 months ago
Testing Consequences of Grime Buildup in Object Oriented Design Patterns
Evidence suggests that as software ages the original realizations of design patterns remain in place, and participants in design pattern realizations accumulate “grime” – no...
Clemente Izurieta, James M. Bieman
MOBILITY
2009
ACM
14 years 6 days ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
RE
2010
Springer
13 years 2 months ago
A UML-based static verification framework for security
Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates...
Igor Siveroni, Andrea Zisman, George Spanoudakis