Sciweavers

74 search results - page 5 / 15
» Addressing Software Security and Mitigations in the Life Cyc...
Sort
View
NSPW
2006
ACM
14 years 1 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
SOFTWARE
2002
13 years 7 months ago
Failure or Success?
The body of literature on SMEs suggest that all SMEs seem to go through different life cycles, and while the terms used by different authors may vary, the events that govern them ...
OOPSLA
2004
Springer
14 years 1 months ago
Empirical investigation of the impact of extreme programming practices on software projects
Extreme Programming (XP) is an agile software development methodology composed of several practices that purportedly yield high quality and high customer satisfaction. However, th...
Lucas Layman
ICONS
2009
IEEE
14 years 2 months ago
Ontology-Based Decision Support for Information Security Risk Management
—As e-Business and e-Commerce applications are increasingly exposed to a variety of information security threats, corporate decision makers are increasingly forced to pay attenti...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer
FIDJI
2003
Springer
14 years 28 days ago
Seamless UML Support for Service-Based Software Architectures
The UML has become the de facto standard for the analysis and design of complex software. Tool support today includes the generation of code realizing the structural model describe...
Matthias Tichy, Holger Giese