Sciweavers

276 search results - page 8 / 56
» Software Security Checklist for the Software Life Cycle
Sort
View
IEEECIT
2006
IEEE
14 years 1 months ago
Integrating Configuration Management and Process Management Based on Life Cycle Control
Currently Configuration Management (CM) tool and Process Management (PM) tool are both largely applied in software organizations. However, neither of them can effectively support ...
Xin Peng, Wenyun Zhao, Chongxiang Zhu
IEEEARES
2009
IEEE
14 years 2 months ago
Linking Privacy Solutions to Developer Goals
Privacy is gaining importance since more and more data becomes digitalized. There is also a growing interest from the security community because of the existing synergy between se...
Kim Wuyts, Riccardo Scandariato, Bart De Decker, W...
CODES
2003
IEEE
14 years 1 months ago
Tracking object life cycle for leakage energy optimization
The focus of this work is on utilizing the state of objects during their lifespan in optimizing the leakage energy consumed in the data caches when executing embedded Java applica...
Guangyu Chen, Narayanan Vijaykrishnan, Mahmut T. K...
ICDCIT
2004
Springer
14 years 1 months ago
Secure Requirements Elicitation Through Triggered Message Sequence Charts
Abstract. This paper argues for performing information-flow-based security analysis in the first phaseof the software development life cycle itself ie in the requirements elicita...
Arnab Ray, Bikram Sengupta, Rance Cleaveland
OOPSLA
2005
Springer
14 years 1 months ago
AutAT: an eclipse plugin for automatic acceptance testing of web applications
In this paper we describe AutAT, an open source Eclipse plugin to better enable test driven development of web applications. AutAT lets non-technical people write acceptance tests...
Christian Schwarz, Stein Kåre Skytteren, Tro...