Sciweavers

568 search results - page 55 / 114
» Enforcing traceability in software
Sort
View
IRI
2006
IEEE
14 years 4 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
IWPC
2005
IEEE
14 years 3 months ago
Concise and Consistent Naming
Approximately 70% of the source code of a software system consists of identifiers. Hence, the names chosen as identifiers are of paramount importance for the readability of comp...
Florian Deißenböck, Markus Pizka
ACMICEC
2005
ACM
156views ECommerce» more  ACMICEC 2005»
14 years 3 months ago
Establishing and maintaining compatibility in service oriented business collaboration
Current composite web service development and management solutions, e.g. BPEL, do not cater for assessing and maintaining comparability of business partners during business collab...
Bart Orriëns, Jian Yang
RE
2010
Springer
13 years 4 months ago
Effort and Quality of Recovering Requirements-to-Code Traces: Two Exploratory Experiments
Trace links between requirements and code are essential for many software development and maintenance activities. Despite significant advances in traceability research, creating li...
Alexander Egyed, Florian Graf, Paul Grünbache...
CODES
2005
IEEE
14 years 3 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...