Sciweavers

2236 search results - page 24 / 448
» Secure Software Design in Practice
Sort
View
ICSE
2012
IEEE-ACM
11 years 11 months ago
Characterizing logging practices in open-source software
—Software logging is a conventional programming practice. While its efficacy is often important for users and developers to understand what have happened in the production run, ...
Ding Yuan, Soyeon Park, Yuanyuan Zhou
OOPSLA
2010
Springer
13 years 6 months ago
The Tower of Babel did not fail
Fred Brooks’ retelling of the biblical story of the Tower of Babel offers many insights into what makes building software difficult. The difficulty, according to common interp...
Paul Adamczyk, Munawar Hafiz
CCS
2004
ACM
14 years 1 months ago
Privacy and security in library RFID: issues, practices, and architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries ...
David Molnar, David Wagner
AGILEDC
2007
IEEE
14 years 2 months ago
Towards Extreme(ly) Usable Software: Exploring Tensions Between Usability and Agile Software Development
Design is an inherently multidisciplinary endeavor. This raises the question of how to develop systems in ways that can best leverage the perspectives, practices, and knowledge ba...
Jason Chong Lee, D. Scott McCrickard
ESORICS
2007
Springer
14 years 2 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...