Sciweavers

2236 search results - page 55 / 448
» Secure Software Design in Practice
Sort
View
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
15 years 6 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...
BIRTHDAY
2006
Springer
15 years 6 months ago
Composition by Colimit and Formal Software Development
Abstract. Goguen emphasized long ago that colimits are how to compose systems [7]. This paper corroborates and elaborates Goguen's vision by presenting a variety of situations...
Douglas R. Smith
P2P
2008
IEEE
138views Communications» more  P2P 2008»
15 years 8 months ago
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance
We present a content delivery infrastructure distributing and maintaining software packages in a large organization. Our work based on a trace-based analysis of an existing softwa...
Purvi Shah, Jehan-François Pâris, Jef...
ACSAC
2004
IEEE
15 years 6 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
ECOOP
1995
Springer
15 years 6 months ago
Experience Using Design Patterns to Evolve Communication Software Across Diverse OS Platforms
Design patterns help to improve communication software quality since they address a fundamental challenge in largescale software development: communicationof architectural knowled...
Douglas C. Schmidt, Paul Stephenson