Sciweavers

1177 search results - page 52 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
CCS
2007
ACM
14 years 2 months ago
An independent audit framework for software dependent voting systems
The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. O...
Sujata Garera, Aviel D. Rubin
KBSE
2005
IEEE
14 years 2 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
AGILEDC
2007
IEEE
14 years 3 months ago
Towards Extreme(ly) Usable Software: Exploring Tensions Between Usability and Agile Software Development
Design is an inherently multidisciplinary endeavor. This raises the question of how to develop systems in ways that can best leverage the perspectives, practices, and knowledge ba...
Jason Chong Lee, D. Scott McCrickard
SNPD
2003
13 years 10 months ago
An Integrated Design Environment for Collaborative Tailoring
In this paper, we describe an approach and a prototype to enable participatory, collaborative tailoring of and within a groupware application. Our approach suggests extending the ...
Volkmar Pipek
SIGCOMM
2009
ACM
14 years 3 months ago
Crossbow: a vertically integrated QoS stack
This paper describes a new architecture which addresses Quality of Service (QoS) by creating unique flows for applications, services, or subnets. A flow is a dedicated and indep...
Sunay Tripathi, Nicolas Droux, Thirumalai Srinivas...