Abstract. The OHSWG has by now moved from specifications to running code. This is an important step, not only because this is the only way of maturing the specifications, but also ...
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...
Teaching software modeling and software design presents a different and difficult set of problems than teaching some of the other aspects of software engineering such as testing a...
The author reviewed and participated in several exemplar industry projects from the Indian IT industry to study the integration of human-computer interaction (HCI) design into soft...
The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...