Sciweavers

3003 search results - page 75 / 601
» Software Security: Building Security In
Sort
View
IJISEC
2006
88views more  IJISEC 2006»
13 years 7 months ago
Requirements engineering for trust management: model, methodology, and reasoning
Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizatio...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
ICSE
2005
IEEE-ACM
14 years 7 months ago
Improving software security with a C pointer analysis
Dzintars Avots, Michael Dalton, V. Benjamin Livshi...
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
14 years 16 days ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
COMPSAC
2006
IEEE
14 years 1 months ago
A Software Architectural Approach to Security by Design
This paper shows how an architecture description notation that has support for timed events can be used to provide a meta-language for specifying exact communication semantics. Th...
Arnab Ray, Rance Cleaveland