Sciweavers

5843 search results - page 90 / 1169
» Software Security in Practice
Sort
View
APSEC
2006
IEEE
14 years 3 months ago
A Practical Estimation Method for Complex RE
Software projects typically require effort estimation from the Software Development Life Cycle (SDLC) staff at the commencement of the software development activities. Inaccuracie...
Bhavani Palyagar, Frank Moisiadis
OOPSLA
2001
Springer
14 years 1 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
CCS
2010
ACM
14 years 3 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
CCS
2008
ACM
13 years 11 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
ASWEC
2000
IEEE
14 years 1 months ago
COTS Developers Lead Best Practice Adoption
As part of an Australian National Industry Improvement Program, a software development 'best practice' survey was conducted in Queensland. The questionnaire was adapted ...
Aileen Cater-Steel