Sciweavers

2236 search results - page 21 / 448
» Secure Software Design in Practice
Sort
View
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
14 years 2 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
QOSA
2010
Springer
14 years 12 days ago
Good Architecture = Good (ADL + Practices)
In order to ensure the quality of their software development process, companies incorporate best practices from recognized repositories or from their own experiences. These best pr...
Vincent Le Gloahec, Régis Fleurquin, Salah ...
FSE
1997
Springer
131views Cryptology» more  FSE 1997»
14 years 19 days ago
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor
Most encryption algorithms are designed without regard to their performance on top-of-the-line microprocessors. This paper discusses general optimization principles algorithms desi...
Bruce Schneier, Doug Whiting
CASCON
1997
112views Education» more  CASCON 1997»
13 years 9 months ago
An examination of software engineering work practices
This paper presents work practice data of the daily activities of software engineers. Four separate studies are presented; one looking longitudinally at an individual SE; two look...
Janice Singer, Timothy C. Lethbridge, Norman G. Vi...
IS
2007
13 years 8 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini