Sciweavers

2236 search results - page 32 / 448
» Secure Software Design in Practice
Sort
View
FECS
2008
142views Education» more  FECS 2008»
13 years 10 months ago
Teaching Software Modeling and Design Based on The Science of Design and Science of Learning
Teaching software modeling and software design presents a different and difficult set of problems than teaching some of the other aspects of software engineering such as testing a...
Sukhamay Kundu
CCS
2008
ACM
13 years 10 months ago
Is complexity really the enemy of software security?
Software complexity is often hypothesized to be the enemy of software security. We performed statistical analysis on nine code complexity metrics from the JavaScript Engine in the...
Yonghee Shin, Laurie Williams
WICSA
2008
13 years 10 months ago
Ready! Set! Go! An Action Research Agenda for Software Architecture Research
Software architecture practice is highly complex. Software architects interact with business as well as technical aspects of systems, often embedded in large and changing organiza...
Henrik Bærbak Christensen, Klaus Marius Hans...
LICS
2006
IEEE
14 years 2 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
SOUPS
2010
ACM
14 years 11 days ago
Do windows users follow the principle of least privilege?: investigating user account control practices
The principle of least privilege requires that users and their programs be granted the most restrictive set of privileges possible to perform required tasks in order to limit the ...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov