Sciweavers

74 search results - page 8 / 15
» Addressing Software Security and Mitigations in the Life Cyc...
Sort
View
HICSS
1995
IEEE
101views Biometrics» more  HICSS 1995»
13 years 11 months ago
Prototyping of parallel and distributed object-oriented systems: the PDC model and its environment
To ease the implementation of distributed objectoriented systems we developed the PDC technique (Proxy/ Dispatcher/Collocutor technique), a simple and pragmatic approach to allow ...
Rainer Weinreich, Reinhold Plösch
SACMAT
2003
ACM
14 years 1 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
KBSE
2010
IEEE
13 years 6 months ago
Reducing estimation uncertainty with continuous assessment: tracking the "cone of uncertainty"
Accurate software cost and schedule estimations are essential especially for large software projects. However, once the required efforts have been estimated, little is done to rec...
Pongtip Aroonvatanaporn, Chatchai Sinthop, Barry W...
OOPSLA
2010
Springer
13 years 6 months ago
Teaching and training developer-testing techniques and tool support
Developer testing is a type of testing where developers test their code as they write it, as opposed to testing done by a separate quality assurance organization. Developer testin...
Tao Xie, Jonathan de Halleux, Nikolai Tillmann, Wo...
CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
14 years 1 months ago
Predicting Secret Keys Via Branch Prediction
This paper announces a new software side-channel attack — enabled by the branch prediction capability common to all modern highperformance CPUs. The penalty paid (extra clock cyc...
Onur Aciiçmez, Çetin Kaya Koç...