Sciweavers

276 search results - page 6 / 56
» Software Security Checklist for the Software Life Cycle
Sort
View
OOPSLA
2004
Springer
14 years 1 months ago
Empirical investigation of the impact of extreme programming practices on software projects
Extreme Programming (XP) is an agile software development methodology composed of several practices that purportedly yield high quality and high customer satisfaction. However, th...
Lucas Layman
ECLIPSE
2006
ACM
14 years 1 months ago
Embedded device solution life cycle support with Eclipse
The effectiveness of life cycle management of an embedded device solution is crucial to its value proposition. This paper shows that Eclipse technology can be used for both tooli...
ChangWoo Jung, Han Chen
RE
2008
Springer
13 years 6 months ago
Supporting Requirements Model Evolution throughout the System Life-Cycle
Requirements models are essential not just during system implementation, but also to manage system changes post-implementation. Such models should be supported by a requirements m...
Neil A. Ernst, John Mylopoulos, Yijun Yu, Tien Ngu...
ICSE
2009
IEEE-ACM
13 years 5 months ago
Security Test Generation Using Threat Trees
Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...
ESSOS
2009
Springer
14 years 2 months ago
Toward Non-security Failures as a Predictor of Security Faults and Failures
In the search for metrics that can predict the presence of vulnerabilities early in the software life cycle, there may be some benefit to choosing metrics from the non-security rea...
Michael Gegick, Pete Rotella, Laurie Williams