Sciweavers

5843 search results - page 106 / 1169
» Software Security in Practice
Sort
View
SSIRI
2010
13 years 8 months ago
Model-Based Argument Analysis for Evolving Security Requirements
Thein Than Tun, Yijun Yu, Charles B. Haley, Bashar...
ICSOFT
2009
13 years 8 months ago
A Knowledge Base for Justified Information Security Decision-making
Daria Stepanova, Simon Edward Parkin, Aad P. A. va...
CHIMIT
2009
ACM
14 years 4 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...
SIGMOD
2008
ACM
119views Database» more  SIGMOD 2008»
14 years 10 months ago
Report on the Principles of Provenance Workshop
Provenance, or records of the origin, context, custody, derivation or other historical information about a (digital) object, has recently become an important research topic in a n...
James Cheney, Peter Buneman, Bertram Ludäscher
CIMCA
2008
IEEE
14 years 4 months ago
Analysing Boundary Objects to Develop Results that Support Business Goals
In this study of eight outsourcing projects, we seek to understand the mechanisms that companies put in place to coordinate knowledge work across their boundaries. We find that m...
María Laura Ponisio, Peter Vruggink