Sciweavers

577 search results - page 45 / 116
» Engineering Sufficiently Secure Computing
Sort
View
120
Voted
SIGCSE
2009
ACM
139views Education» more  SIGCSE 2009»
16 years 3 months ago
On preparing students for distributed software development with a synchronous, collaborative development platform
Working remotely is becoming the norm for both professionals and students alike. Software development has become a global industry due to outsourcing, teleworking, flex time, and ...
Andrew Meneely, Laurie Williams
113
Voted
ECMDAFA
2006
Springer
136views Hardware» more  ECMDAFA 2006»
15 years 6 months ago
Finding a Path to Model Consistency
A core problem in Model Driven Engineering is model consistency achievement: all models must satisfy relationships constraining them. Active consistency techniques monitor and cont...
Gregory de Fombelle, Xavier Blanc, Laurent Rioux, ...
174
Voted
FASE
2008
Springer
15 years 4 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
164
Voted
MEDIAFORENSICS
2010
15 years 1 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
121
Voted
COMPSAC
2003
IEEE
15 years 8 months ago
PeAgent - A Mobile Agent System to Support Secure Internet and Web Applications
Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm mo...
Qingkai Ma, Wei Hao, Wei Li, Manghui Tu, I-Ling Ye...