Sciweavers

5843 search results - page 112 / 1169
» Software Security in Practice
Sort
View
ESSOS
2009
Springer
14 years 5 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
EUROSYS
2011
ACM
13 years 1 months ago
ZZ and the art of practical BFT execution
The high replication cost of Byzantine fault-tolerance (BFT) methods has been a major barrier to their widespread adoption in commercial distributed applications. We present ZZ, a...
Timothy Wood, Rahul Singh, Arun Venkataramani, Pra...
RE
2002
Springer
13 years 9 months ago
Extreme Programming Modified: Embrace Requirements Engineering Practices
Extreme Programming (XP) is an agile (lightweight) software development methodology and it becomes more and more popular. XP proposes many interesting practices, but it also has s...
Jerzy R. Nawrocki, Michal Jasiñski, Bartosz...
SIGCSE
2004
ACM
101views Education» more  SIGCSE 2004»
14 years 3 months ago
Components-first approaches to CS1/CS2: principles and practice
Ê Among the many ways to focus CS1/CS2 content, two have been published that emphasize concepts of component-based software engineering. Courses based on these two instances of a ...
Emily Howe, Matthew Thornton, Bruce W. Weide
KBSE
2008
IEEE
14 years 4 months ago
Mashups and modularity: Towards secure and reusable web applications
The software industry is currently experiencing a paradigm shift towards web-based software. We argue that web technologies should evolve in a direction that would allow the devel...
Antero Taivalsaari, Tommi Mikkonen