Sciweavers

258 search results - page 14 / 52
» Portable secure identity management for software engineering
Sort
View
METRICS
1996
IEEE
14 years 18 days ago
Evaluating the Impact of Object-Oriented Design on Software Quality
This paper describes the results of a study where the impact of Object-Oriented design on software quality characteristics is experimentally evaluated. A suite of metrics for OO d...
Fernando Brito e Abreu, Walcélio L. Melo
DRM
2008
Springer
13 years 10 months ago
A four-layer model for security of digital rights management
Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This co...
Eric Diehl
CCS
2004
ACM
14 years 1 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
CLUSTER
2001
IEEE
14 years 3 days ago
NPACI Rocks: Tools and Techniques for Easily Deploying Manageable Linux Clusters
High-performance computing clusters (commodity hardware with low-latency, high-bandwidth interconnects) based on Linux, are rapidly becoming the dominant computing platform for a ...
Philip M. Papadopoulos, Mason J. Katz, Greg Bruno
OOPSLA
2005
Springer
14 years 1 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...