Sciweavers

8623 search results - page 172 / 1725
» Software engineering for secure systems
Sort
View
DIAGRAMS
2006
Springer
15 years 6 months ago
Flow Diagrams: Rise and Fall of the First Software Engineering Notation
Drawings of water are the earliest, least abstract forms of flow diagram. Representations of ideal or generalised sequences for manufacturing or actual paths for materials between ...
Stephen J. Morris, O. C. Z. Gotel
CCS
2009
ACM
16 years 3 months ago
Lightweight self-protecting JavaScript
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designe...
Phu H. Phung, David Sands, Andrey Chudnov
VSTTE
2005
Springer
15 years 8 months ago
Reliable Software Systems Design: Defect Prevention, Detection, and Containment
The grand challenge that is the focus of this conference targets the development of a practical methodology for software verification: a methodology that can help us to reduce the ...
Gerard J. Holzmann, Rajeev Joshi
133
Voted
ESEM
2009
ACM
15 years 19 days ago
Security of open source web applications
In an empirical study of fourteen widely used open source PHP web applications, we found that the vulnerability density of the aggregate code base decreased from 8.88 vulnerabilit...
James Walden, Maureen Doyle, Grant A. Welch, Micha...
KBSE
2008
IEEE
15 years 9 months ago
Automated Mapping from Goal Models to Self-Adaptive Systems
Self-adaptive systems should autonomously adapt at run time to changes in their operational environment, guided by the goals assigned by their stakeholders. We present a tool that...
Mirko Morandini, Loris Penserini, Anna Perini