Sciweavers

8623 search results - page 150 / 1725
» Software engineering for secure systems
Sort
View
CAI
2000
Springer
13 years 9 months ago
Schema Evolution in Software Engineering Databases - a New Approach in Adele Environment
Abstract. This paper discusses schema evolution in software engineering databases. After a study of existing approaches, we show that these approaches do not satisfy software engin...
Mohamed Ahmed-Nacer, Jacky Estublier
IEEEARES
2009
IEEE
13 years 7 months ago
Software Inspections Using Guided Checklists to Ensure Security Goals
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the syste...
Frank Elberzhager, Alexander Klaus, Marek Jawurek
EUROSYS
2009
ACM
14 years 6 months ago
A runtime system for software lock elision
Amitabha Roy 0002, Steven Hand, Timothy L. Harris
AUIC
2003
IEEE
14 years 2 months ago
User Interface Requirements for Authentication of Communication
Authentication is a security service that consists of verifying that someone’s identity is as claimed. There are a number of challenges to presenting information from the authen...
Audun Jøsang, Mary Anne Patton
GRC
2007
IEEE
14 years 1 months ago
Perspectives of Granular Computing in Software Engineering
Granular computing is not only a computing model for computer-centered problem solving, but also a thinking model for human-centered problem solving. Some authors have presented t...
Jianchao Han, Jing Dong