Sciweavers

1177 search results - page 45 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
CCS
2008
ACM
13 years 10 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
ASWEC
2008
IEEE
14 years 3 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
SE
2010
13 years 10 months ago
Design Decisions in Model-driven Software Development
: Numerous design decisions are made in model-driven software development which are mostly implicit and not documented properly. Hence, the design knowledge is usually 'in the...
Patrick Könemann
DCOSS
2005
Springer
14 years 2 months ago
jWebDust : A Java-Based Generic Application Environment for Wireless Sensor Networks
Abstract. Wireless sensor networks can be very useful in applications that require the detection of crucial events, in physical environments subjected to critical conditions, and t...
Ioannis Chatzigiannakis, Georgios Mylonas, Sotiris...
EUROMICRO
2005
IEEE
14 years 2 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca