Sciweavers

258 search results - page 11 / 52
» Portable secure identity management for software engineering
Sort
View
ICRA
2007
IEEE
150views Robotics» more  ICRA 2007»
14 years 2 months ago
Enhancing Software Modularity and Extensibility: A Case for using Generic Data Representations
— Portable, modular and extensible software allows robotics researchers to pool their resources by sharing algorithms, thus advancing research in the field of robotics at a fast...
Gregory Broten
ICSE
2007
IEEE-ACM
14 years 8 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...
OOPSLA
2005
Springer
14 years 1 months ago
Model-driven software product lines
iven software product lines combine the abstraction capability of Model Driven Software Development (MDSD) and the variability management capability of Software Product Line Engin...
Krzysztof Czarnecki, Michal Antkiewicz, Chang Hwan...
ESSOS
2009
Springer
14 years 3 months ago
Idea: Trusted Emergency Management
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency i...
Timothy E. Levin, Cynthia E. Irvine, Terry Benzel,...
ICSEA
2007
IEEE
14 years 2 months ago
Making Cost Effective Security Decision with Real Option Thinking
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
Jingyue Li, Xiaomeng Su