Sciweavers

129 search results - page 9 / 26
» Identifying Security Aspects in Early Development Stages
Sort
View
FM
2009
Springer
95views Formal Methods» more  FM 2009»
14 years 1 months ago
It's Doomed; We Can Prove It
Abstract. Programming errors found early are the cheapest. Tools applying to the early stage of code development exist but either they suffer from false positives (“noise”) or...
Jochen Hoenicke, K. Rustan M. Leino, Andreas Podel...
ACMSE
2005
ACM
14 years 8 days ago
On developing a simple in-house digital library archive
Digital libraries (DLs) have become a major focus of information technology resources for organizations from academia, to the US Department of Defense to the archeological efforts...
Eric L. Brown, Luis G. Velazco, G. Kirksey, S. Ram...
GI
2005
Springer
14 years 7 days ago
Analysis and Design Techniques for Service-Oriented Development and Integration
: Service-Oriented Architectures (SOAs) have been established as an IT strategy to support the on demand goal of business agility. Web services standards and their implementations ...
Olaf Zimmermann, Niklas Schlimm, Günter Walle...
ACSAC
2005
IEEE
14 years 10 days ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
IIE
2006
185views more  IIE 2006»
13 years 6 months ago
ICT Teaching Experience Sharing in Higher Education: an Education Development Approach
Abstract. With the growing awareness of the scholarship of teaching and the appropriate incorporation of Information and Communications Technologies (ICT) in higher education, ther...
Jacky Wai-cheong Pow