Sciweavers

1177 search results - page 116 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
ISSRE
2005
IEEE
14 years 2 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier
OOPSLA
2000
Springer
14 years 14 days ago
Finding refactorings via change metrics
Reverse engineering is the process of uncovering the design and the design rationale from a functioning software system. Reverse engineering is an integral part of any successful ...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...
APSEC
2000
IEEE
14 years 1 months ago
Component-based software engineering: technologies, development frameworks, and quality assurance schemes
Component-based software development approach is based on the idea to develop software systems by selecting appropriate off-the-shelf components and then to assemble them with a w...
Xia Cai, Michael R. Lyu, Kam-Fai Wong, Roy Ko
ICSE
2005
IEEE-ACM
14 years 9 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
IC
2003
13 years 10 months ago
Issues in Integration of Civil Engineering Services and Tools
—Civil Engineering is a discipline providing one of the most challenging environments for integration and interoperability. Great hopes are wired and wireless networking technolo...
Ziga Turk, Tomo Cerovsek, Raimar J. Scherer