Sciweavers

8623 search results - page 29 / 1725
» Software engineering for secure systems
Sort
View
ICSOFT
2009
13 years 5 months ago
A Knowledge Base for Justified Information Security Decision-making
Daria Stepanova, Simon Edward Parkin, Aad P. A. va...
TAPSOFT
1997
Springer
13 years 12 months ago
A Type-Based Approach to Program Security
This paper presents a type system which guarantees that well-typed programs in a procedural programming language satisfy a noninterference security property. With all program input...
Dennis M. Volpano, Geoffrey Smith
EWSA
2006
Springer
13 years 11 months ago
Preserving Software Quality Characteristics from Requirements Analysis to Architectural Design
In this paper, we present a pattern-based software development method that preserves usability and security quality characteristics using a role-driven mapping of requirements anal...
Holger Schmidt, Ina Wentzlaff
HOTSWUP
2009
ACM
14 years 12 days ago
An Implementation of the Linux Software Repository Model for Other Operating Systems
Year after year, the frequency of updated releases of software continues to increase. Without an automated install process, the result is either that a system installs software wi...
Neil McNab, Anthony Bryan
AOSD
2009
ACM
14 years 2 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter