Sciweavers

3792 search results - page 12 / 759
» Techniques for Trusted Software Engineering
Sort
View
TAPSOFT
1997
Springer
14 years 2 months ago
A Comparison of Modular Verification Techniques
Henrik Reif Andersen, Jørgen Staunstrup, Ni...
RE
2002
Springer
13 years 9 months ago
Application of Linguistic Techniques for Use Case Analysis
Alessandro Fantechi, Stefania Gnesi, Giuseppe Lami...
ICST
2010
IEEE
13 years 8 months ago
GUI Testing Techniques Evaluation by Designed Experiments
Cristiano Bertolini, Alexandre Mota, Eduardo Aranh...
ISORC
2008
IEEE
14 years 4 months ago
A Flexible Trust Model for Distributed Service Infrastructures
Recent years have witnessed the emergence and rapid growth of distributed service infrastructures such as mobile ad hoc networks, P2P, PlanetLab and Grids. In such distributed inf...
Zhaoyu Liu, Stephen S. Yau, Dichao Peng, Yin Yin
RE
2004
Springer
14 years 3 months ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...