Sciweavers

4923 search results - page 54 / 985
» Software Risk Management
Sort
View
APSEC
2003
IEEE
14 years 2 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
TASE
2009
IEEE
14 years 3 months ago
Interpreting a Successful Testing Process: Risk and Actual Coverage
Testing is inherently incomplete; no test suite will ever be able to test all possible usage scenarios of a system. It is therefore vital to assess the implication of a system pas...
Mariëlle Stoelinga, Mark Timmer
ECAI
2004
Springer
14 years 2 months ago
A Risk-Based Bidding Strategy for Continuous Double Auctions
We develop a novel bidding strategy that software agents can use to buy and sell goods in Continuous Double Auctions (CDAs). Our strategy involves the agent forming a bid or ask by...
Perukrishnen Vytelingum, Rajdeep K. Dash, Esther D...
ESORICS
2010
Springer
13 years 9 months ago
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the...
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven...
SIN
2010
ACM
13 years 6 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch