Sciweavers

2030 search results - page 182 / 406
» Checklists for Software Engineering Case Study Research
Sort
View
CCS
2009
ACM
14 years 3 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
RE
2004
Springer
14 years 1 months ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
DAI
1995
Springer
13 years 11 months ago
A Methodology for Developing Agent Based Systems
Potentially one of the most significant opportunities for enterprise integration is the recent development and advancement of agent based systems. However, before agents can be us...
Elizabeth A. Kendall, Margaret T. Malkoun, Chong H...
RE
2006
Springer
13 years 8 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
SIGSOFT
2003
ACM
14 years 9 months ago
Regression testing of GUIs
Although graphical user interfaces (GUIs) constitute a large part of the software being developed today and are typically created using rapid prototyping, there are no effective r...
Atif M. Memon, Mary Lou Soffa