Sciweavers

5843 search results - page 90 / 1169
» Software Security in Practice
Sort
View
113
Voted
APSEC
2006
IEEE
15 years 8 months ago
A Practical Estimation Method for Complex RE
Software projects typically require effort estimation from the Software Development Life Cycle (SDLC) staff at the commencement of the software development activities. Inaccuracie...
Bhavani Palyagar, Frank Moisiadis
179
Voted
OOPSLA
2001
Springer
15 years 7 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
108
Voted
CCS
2010
ACM
15 years 9 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
141
Voted
CCS
2008
ACM
15 years 4 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
110
Voted
ASWEC
2000
IEEE
15 years 7 months ago
COTS Developers Lead Best Practice Adoption
As part of an Australian National Industry Improvement Program, a software development 'best practice' survey was conducted in Queensland. The questionnaire was adapted ...
Aileen Cater-Steel