Sciweavers

8503 search results - page 142 / 1701
» Secure Software Architectures
Sort
View
SOCO
2008
Springer
13 years 9 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
ESEM
2010
ACM
13 years 7 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
CCS
2004
ACM
14 years 2 months ago
On achieving software diversity for improved network security using distributed coloring algorithms
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
Adam J. O'Donnell, Harish Sethu
HICSS
2003
IEEE
105views Biometrics» more  HICSS 2003»
14 years 2 months ago
New Software Development Paradigms and Possible Adoption for Security
EGovernment would be a lot easier if it could be handled like eBusiness. Unfortunately there are organizational and legal obstacles that make it virtually impossible. The security...
Matthias Günter, Michael Gisler, Bianca von B...
ECEASST
2010
13 years 3 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...