Sciweavers

8623 search results - page 19 / 1725
» Software engineering for secure systems
Sort
View
ESSOS
2009
Springer
14 years 2 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
OOPSLA
2000
Springer
13 years 11 months ago
Finding refactorings via change metrics
Reverse engineering is the process of uncovering the design and the design rationale from a functioning software system. Reverse engineering is an integral part of any successful ...
Serge Demeyer, Stéphane Ducasse, Oscar Nier...
ISSRE
2008
IEEE
14 years 2 months ago
Assessing the Effect of Software Failures on Trust Assumptions
The contribution of this paper is a technique to assess whether software failures during operational use can invalidate the trust assumptions and, hence, the adequacy of the softw...
Qian Feng, Robyn R. Lutz
CCS
2007
ACM
14 years 1 months ago
An independent audit framework for software dependent voting systems
The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. O...
Sujata Garera, Aviel D. Rubin
REFSQ
2010
Springer
13 years 9 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...