Sciweavers

2236 search results - page 86 / 448
» Secure Software Design in Practice
Sort
View
131
Voted
HOTOS
1997
IEEE
15 years 6 months ago
Operating Systems for Component Software Environments
Although component software has emerged as one of the most significant and commercially successful technologies of the past few years, few operating systems are designed to host a...
Noah Mendelsohn
105
Voted
CLEIEJ
2007
86views more  CLEIEJ 2007»
15 years 2 months ago
Requirements Game: Teaching Software Project Management
: Several business areas, like Management and Negotiation, have used games like a didactic way to simulate world reality, to introduce students to the day-to-day generated problems...
Carlos Mario Zapata Jaramillo, Gabriel Awad-Aubad
121
Voted
OOPSLA
2004
Springer
15 years 8 months ago
A practical type system and language for reference immutability
This paper describes a type system that is capable of expressing and enforcing immutability constraints. The specific constraint exis that the abstract state of the object to whi...
Adrian Birka, Michael D. Ernst
121
Voted
DGO
2008
112views Education» more  DGO 2008»
15 years 3 months ago
Mapping theory to practice: a cartographic analysis of public safety networks
This paper provides an interim report on ongoing data collection and analysis efforts as part of a large-scale study of information technology- focused interagency collaborations ...
Christine B. Williams, M. Lynne Markus, Michael Ty...
144
Voted
KBSE
2007
IEEE
15 years 9 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu