Sciweavers

54 search results - page 7 / 11
» Assessing Security Properties of Software Components: A Soft...
Sort
View
WWW
2010
ACM
14 years 2 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
ICAIL
2007
ACM
13 years 11 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
ISARCS
2010
141views Hardware» more  ISARCS 2010»
13 years 11 months ago
Integrating Fault-Tolerant Techniques into the Design of Critical Systems
Abstract. Software designs equipped with specification of dependability techniques can help engineers to develop critical systems. In this work, we start to envision how a softwar...
Ricardo J. Rodríguez, José Merseguer
CG
2007
Springer
13 years 7 months ago
Visual data mining and analysis of software repositories
In this article we describe an ongoing effort to integrate information visualization techniques into the process of configuration management for software systems. Our focus is to...
Lucian Voinea, Alexandru Telea
ISESE
2005
IEEE
14 years 18 days ago
The use and usefulness of the ISO/IEC 9126 quality standard
This paper reports an evaluation the utility of ISO/IEC 9126. ISO/IEC 9126 is an international standard intended to ensure the quality of all software-intensive products including...
Hiyam Al-Kilidar, Karl Cox, Barbara Kitchenham