Sciweavers

276 search results - page 38 / 56
» Software Security Checklist for the Software Life Cycle
Sort
View
FSE
2003
Springer
99views Cryptology» more  FSE 2003»
14 years 2 months ago
Rabbit: A New High-Performance Stream Cipher
Abstract. We present a new stream cipher, Rabbit, based on iterating a set of coupled nonlinear functions. Rabbit is characterized by a high performance in software with a measured...
Martin Boesgaard, Mette Vesterager, Thomas Pederse...
DAC
2006
ACM
14 years 21 days ago
IMPRES: integrated monitoring for processor reliability and security
Security and reliability in processor based systems are concerns requiring adroit solutions. Security is often compromised by code injection attacks, jeopardizing even `trusted so...
Roshan G. Ragel, Sri Parameswaran
ICSE
2003
IEEE-ACM
14 years 9 months ago
ViewPoints: meaningful relationships are difficult!
The development of complex systems invariably involves many stakeholders who have different perspectives on the problem they are addressing, the system being developed, and the pr...
Bashar Nuseibeh, Jeff Kramer, Anthony Finkelstein
KBSE
2007
IEEE
14 years 3 months ago
Modeling bug report quality
Software developers spend a significant portion of their resources handling user-submitted bug reports. For software that is widely deployed, the number of bug reports typically ...
Pieter Hooimeijer, Westley Weimer
SE
2008
13 years 10 months ago
TIME - Tracking Intra- and Inter-Model Evolution
Abstract: Modern software development approaches, especially the model-driven approaches, heavily rely on the use of models during the whole development process. With the increasin...
Maximilian Kögel