Sciweavers

26 search results - page 2 / 6
» Building More Secure Commercial Software: The Trustworthy Co...
Sort
View
COMPSAC
2008
IEEE
13 years 9 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma
ESOP
2005
Springer
14 years 29 days ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
OOPSLA
2010
Springer
13 years 5 months ago
Towards a tool-based development methodology for sense/compute/control applications
This poster presents a design language and a tool suite covering the development life-cycle of a Sense/Compute/Control (SCC) application. This language makes it possible to define...
Damien Cassou, Julien Bruneau, Julien Mercadal, Qu...
LADC
2007
Springer
14 years 1 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
OOPSLA
2005
Springer
14 years 28 days ago
Estimating software based on use case points
It is well documented that software product cost estimates are notoriously inaccurate across the software industry. Creating accurate cost estimates for software product developme...
Edward R. Carroll