Sciweavers

276 search results - page 40 / 56
» Software Security Checklist for the Software Life Cycle
Sort
View
IJSNET
2008
118views more  IJSNET 2008»
13 years 9 months ago
Public key cryptography empowered smart dust is affordable
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...
Steffen Peter, Peter Langendörfer, Krzysztof ...
CSE
2009
IEEE
14 years 3 months ago
Enabling Privacy as a Fundamental Construct for Social Networks
The current set of social networking platforms, e.g. Facebook and MySpace, has created a new class of Internet applications called social software. These systems focus on leveragi...
E. Michael Maximilien, Tyrone Grandison, Kun Liu, ...
FASE
2007
Springer
14 years 3 months ago
A Service Composition Construct to Support Iterative Development
Abstract. Development of composed services requires a continues adaptation of the composed service to the changing environment of offered services. Services may no longer be avail...
Roy Grønmo, Michael C. Jaeger, Andreas Womb...
RE
2007
Springer
14 years 3 months ago
Value-Based Requirements Traceability: Lessons Learned
Abstract. Traceability from requirements to code is mandated by numerous software development standards. These standards, however, are not explicit about the appropriate level of q...
Alexander Egyed, Paul Grünbacher, Matthias He...
HICSS
2005
IEEE
155views Biometrics» more  HICSS 2005»
14 years 2 months ago
Framework for Governance in Open Source Communities
In recent years, the development of software in open source communities has attracted immense attention from research and practice. The idea of commercial quality, free software, ...
Christoph Lattemann, Stefan Stieglitz