Sciweavers

276 search results - page 23 / 56
» Software Security Checklist for the Software Life Cycle
Sort
View
WETICE
1999
IEEE
14 years 1 months ago
Replacing Copies with Connections: Managing Software across the Virtual Organization
The Internet, the World Wide Web, JavaTM technology, and software components are changing the software business. Activities traditionally constrained by the need for intense infor...
Tobias Murer, Michael L. Van de Vanter
WICSA
2004
13 years 10 months ago
Establishing a Software Architecting Environment
We present the work of establishing an integrated environment that facilitates architecture design, reconstruction, and maintenance in the entire life cycle of a software product ...
Claudio Riva, Petri Selonen, Tarja Systä, Ant...
SOFTWARE
2002
13 years 8 months ago
Failure or Success?
The body of literature on SMEs suggest that all SMEs seem to go through different life cycles, and while the terms used by different authors may vary, the events that govern them ...
ICSE
2005
IEEE-ACM
14 years 9 months ago
What you always wanted to know about agile methods but did not dare to ask
A fleet of emerging agile methods is both gaining popularity and generating lots of controversy. Real-world examples argue for (e.g. [4]) and against (e.g. [6]) agile methods. Sev...
Frank Maurer, Grigori Melnik
HIPEAC
2005
Springer
14 years 2 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee