Sciweavers

390 search results - page 69 / 78
» Security Requirements Engineering for Evolving Software Syst...
Sort
View
AGILEDC
2003
IEEE
14 years 21 days ago
YP and Urban Simulation: Applying an Agile Programming Methodology in a Politically Tempestuous Domain
YP is an agile programming methodology that has evolved over the past 15 years. Many of its features are common to other agile methodologies; its novel features include using a hi...
Bjørn N. Freeman-Benson, Alan Borning
SCAM
2008
IEEE
14 years 1 months ago
User-Input Dependence Analysis via Graph Reachability
Bug-checking tools have been used with some success in recent years to find bugs in software. For finding bugs that can cause security vulnerabilities, bug checking tools requir...
Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes
EDBTW
2010
Springer
14 years 2 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
PPPJ
2003
ACM
14 years 20 days ago
An examination of the run-time performance of GUI creation frameworks
The graphical user interface (GUI) is an important component of many software systems. Past surveys indicate that the development of a GUI is a significant undertaking and that t...
Christopher J. Howell, Gregory M. Kapfhammer, Robe...
ECBS
1999
IEEE
138views Hardware» more  ECBS 1999»
13 years 11 months ago
Multi-Domain Surety Modeling and Analysis for High Assurance Systems
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
James Davis, Jason Scott, Janos Sztipanovits, Marc...