Sciweavers

276 search results - page 33 / 56
» Software Security Checklist for the Software Life Cycle
Sort
View
SIGSOFT
2001
ACM
14 years 9 months ago
WREN---an environment for component-based development
Prior research in software environments focused on three important problems-- tool integration, artifact management, and process guidance. The context for that research, and hence...
Chris Lüer, David S. Rosenblum
NORDICHI
2004
ACM
14 years 2 months ago
Procuring a usable system using unemployed personas
This case study examines a procurement project where the Swedish National Labor Market Administration (AMV) hired usability consultants in order to redesign their website for empl...
Erik Markensten, Henrik Artman
USS
2008
13 years 11 months ago
Experiences with Model Inference Assisted Fuzzing
In this paper we introduce the idea of model inference assisted fuzzing aimed to cost effectively improve software security. We experimented with several model inference technique...
Joachim Viide, Aki Helin, Marko Laakso, Pekka Piet...
ACSAC
2002
IEEE
14 years 2 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
AICCSA
2007
IEEE
120views Hardware» more  AICCSA 2007»
14 years 3 months ago
Using Maintainability Based Risk Assessment and Severity Analysis in Prioritizing Corrective Maintenance Tasks
:- A software product spends more than 65% of its lifecycle in maintenance. Software systems with good maintainability can be easily modified to fix faults. In this paper, we adapt...
Walid Abdelmoez, Katerina Goseva-Popstojanova, Han...