Sciweavers

3149 search results - page 182 / 630
» IT security risk management
Sort
View
ICSM
2006
IEEE
14 years 3 months ago
Software Assurance During Maintenance
Software development, testing, and maintenance tools must yield assurance information in a standardized form. Developers can use this information to argue that the software is ade...
Paul E. Black
JIPS
2010
162views more  JIPS 2010»
13 years 4 months ago
Intercepting Filter Approach to Injection Flaws
The growing number of web applications in the global economy has made it critically important to develop secure and reliable software to support the economy's increasing depen...
Ahmed Salem
DIM
2005
ACM
13 years 11 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
IDTRUST
2009
ACM
14 years 4 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
EUROMICRO
2003
IEEE
14 years 2 months ago
Key Decisions in Strategic New Product Development for Small Software Product Businesses
Small companies in the software product business risk rework and market failure due to shortcomings in integrating a strategic perspective into management of product development. ...
Jarno Vähäniitty