Sciweavers

8503 search results - page 126 / 1701
» Secure Software Architectures
Sort
View
ACSAC
1999
IEEE
14 years 1 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 3 months ago
Web Application Scanners: Definitions and Functions
There are many commercial software security assurance tools that claim to detect and prevent vulnerabilities in application software. However, a closer look at the tools often lea...
Elizabeth Fong, Vadim Okun
WIMAW
2008
13 years 10 months ago
Software Industrialization and Architecture Certification
: The industrialization of software development induces several changes to the development process as software development becomes distributed over company borders. They cooperativ...
Christoph Rathfelder, Henning Groenda, Ralf Reussn...
ACSAC
2004
IEEE
14 years 22 days ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
SAC
2009
ACM
14 years 3 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura