Sciweavers

8623 search results - page 33 / 1725
» Software engineering for secure systems
Sort
View
COMPSAC
2006
IEEE
14 years 1 months ago
Preventing Feature Interactions by Constraints
As software systems evolve by adding new extensions some unexpected conflicts may occur, which is known as the Feature Interaction Problem (FIP). FIP is a threat to the dependabil...
Jihong Zuo, Qianxiang Wang, Hong Mei
CD
2004
Springer
14 years 1 months ago
Secure Deployment of Components
Abstract. The secure deployment of components is widely recognized as a crucial problem in component-based software engineering. While major effort is concentrated on preventing ma...
Mark Grechanik, Dewayne E. Perry
WCRE
1999
IEEE
14 years 9 hour ago
A Tool for Securely Integrating Legacy Systems into a Distributed Environment
Legacy systems provide services that remain useful beyond the means of the technology in which they were originally implemented. Our Legacy Wrapper tool packages the services of a...
Timothy S. Souder, Spiros Mancoridis
RE
2006
Springer
13 years 7 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...