Sciweavers

1005 search results - page 57 / 201
» Information systems security engineering: a critical compone...
Sort
View
SSDBM
2007
IEEE
165views Database» more  SSDBM 2007»
14 years 3 months ago
Processing Spatial-Keyword (SK) Queries in Geographic Information Retrieval (GIR) Systems
Location-based information contained in publicly available GIS databases is invaluable for many applications such as disaster response, national infrastructure protection, crime a...
Ramaswamy Hariharan, Bijit Hore, Chen Li, Sharad M...
DOLAP
2009
ACM
14 years 3 months ago
A comprehensive approach to data warehouse testing
Testing is an essential part of the design life-cycle of any software product. Nevertheless, while most phases of data warehouse design have received considerable attention in the...
Matteo Golfarelli, Stefano Rizzi
CCS
2007
ACM
14 years 3 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...
ICSE
2007
IEEE-ACM
14 years 9 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
14 years 27 days ago
Security when people matter: structuring incentives for user behavior
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives p...
Rick Wash, Jeffrey K. MacKie-Mason