Sciweavers

341 search results - page 16 / 69
» A Security Engineering Process based on Patterns
Sort
View
111
Voted
ICDCSW
2005
IEEE
15 years 8 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
EUPROJECTS
2006
Springer
15 years 6 months ago
Applying the MVC Pattern to Generated User Interfaces with a Focus on Audio
The mobile user can interact with devices in the environment using either the devices themselves or a device she carries with her. This requires an adaption of the user interface t...
Dirk Schnelle, Tobias Klug
131
Voted
WWW
2004
ACM
16 years 3 months ago
Web engineering with the visual software circuit board
The Visual Software Circuit Board (VSCB) platform supports a component based development methodology towards the development of software systems. The circuit board design techniqu...
Hovhannes Avoyan, Barry Levine
CCR
2004
79views more  CCR 2004»
15 years 2 months ago
Reverse engineering the Internet
To provide insight into Internet operation and performance, recent efforts have measured various aspects of the Internet, developing and improving measurement tools in the process....
Neil T. Spring, David Wetherall, Thomas E. Anderso...
142
Voted
GI
2009
Springer
15 years 5 days ago
Applying Model-Driven Integration Engineering to e-business - striving towards a framework concept
: Changing business requirements such as providing new business services lead to an ongoing need for fast and flexible adaptation of the underlying information systems and infrastr...
Jens Schenderlein, Sascha Sauer, Tobias Krüge...