Sciweavers

5843 search results - page 78 / 1169
» Software Security in Practice
Sort
View
IEEEARES
2010
IEEE
14 years 3 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 10 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
GCSE
2000
Springer
14 years 19 days ago
The Theory and Practice of Adaptive Components
It is well known that modifying software by hand, especially someone else's, is not only slow and tedious but so notoriously error-prone that we strive for components that ne...
Paul Bassett
ACSAC
2007
IEEE
14 years 1 months ago
Toward a Medium-Robustness Separation Kernel Protection Profile
A protection profile for high-robustness separation kernels has recently been validated and several implementations are under development. However, medium-robustness separation ke...
Rance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine...
CASCON
2006
90views Education» more  CASCON 2006»
13 years 10 months ago
Introducing performance engineering by means of tools and practical exercises
Many software engineers complete their educa
Alexander Ufimtsev, Trevor Parsons, Lucian M. Patc...