Sciweavers

4923 search results - page 27 / 985
» Software Risk Management
Sort
View
DRM
2004
Springer
14 years 2 months ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...
ESSOS
2009
Springer
14 years 3 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
HICSS
2005
IEEE
83views Biometrics» more  HICSS 2005»
14 years 2 months ago
Predicting the Usage of P2P Sharing Software: The Role of Trust and Perceived Risk
Peer-to-Peer, or P2P sharing has gone through fast growth in recent years and drawn the interests of Information Systems (IS) researchers. However, there is a lack of empirical st...
Heng Xu, Hao Wang, Hock-Hai Teo
HICSS
2006
IEEE
145views Biometrics» more  HICSS 2006»
14 years 2 months ago
Resource Decisions in Software Development Using Risk Assessment Model
The resource decisions in software project using cost models do not satisfy managerial decision, as it does not support trade-off analysis among resources. A Bayesian net approach...
Wiboon Jiamthubthugsin, Daricha Sutivong
WETICE
2000
IEEE
14 years 1 months ago
Reducing Software Security Risk through an Integrated Approach
This paper presents joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the Nation...
David P. Gilliam, John C. Kelly, Matt Bishop