Sciweavers

258 search results - page 7 / 52
» Portable secure identity management for software engineering
Sort
View
AGILEDC
2007
IEEE
14 years 2 months ago
Agile Program Management: Lessons Learned from the VeriSign Managed Security Services Team
This report examines how the VeriSign Managed Security Services team (MSS) has successfully extended agile software development practices to deal with a complex, multi-product dev...
Peter Hodgkins, Luke Hohmann
REFSQ
2010
Springer
13 years 10 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...
ECSA
2010
Springer
13 years 8 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
XPU
2010
Springer
13 years 6 months ago
Extreme Product Line Engineering - Refactoring for Variability: A Test-Driven Approach
Software product lines - families of similar but not identical software products - need to address the issue of feature variability. That is, a single feature might require various...
Yaser Ghanam, Frank Maurer
COMPSAC
2009
IEEE
14 years 1 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...