Sciweavers

657 search results - page 76 / 132
» Secure and Usable Requirements Engineering
Sort
View
140
Voted
SOSP
2009
ACM
16 years 13 days ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
MIXER
2004
15 years 5 months ago
Towards a Development Methodology for Augmented Reality User Interfaces
In this paper we describe why we believe that the development of Augmented Reality user interfaces requires special attention and cannot be efficiently handled with neither existi...
Christian Kulas, Christian Sandor, Gudrun Klinker
127
Voted
EUROSYS
2007
ACM
16 years 20 days ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...
150
Voted
SPLC
2010
15 years 1 months ago
Stratified Analytic Hierarchy Process: Prioritization and Selection of Software Features
Product line engineering allows for the rapid development of variants of a domain specific application by using a common set of reusable assets often known as core assets. Variabil...
Ebrahim Bagheri, Mohsen Asadi, Dragan Gasevic, Sam...
129
Voted
ICSE
2003
IEEE-ACM
16 years 3 months ago
DADO: Enhancing Middleware to Support Crosscutting Features in Distributed, Heterogeneous Systems
Some "non-' or "extra-functional" features, such as reliability, security, and tracing, defy modularization mechanisms in programming languages. This makes suc...
Eric Wohlstadter, Stoney Jackson, Premkumar T. Dev...