Sciweavers

3792 search results - page 188 / 759
» Techniques for Trusted Software Engineering
Sort
View
92
Voted
IH
1998
Springer
15 years 8 months ago
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control th...
Markus G. Kuhn, Ross J. Anderson
ICSE
2003
IEEE-ACM
16 years 4 months ago
A Framework for Managing Traceability Relationships between Requirements and Architectures
Traceability helps stakeholders to understand the relationships that exist between software artifacts created during a software development project. For example, the evolution of ...
Susanne A. Sherba, Kenneth M. Anderson
EMSOFT
2011
Springer
14 years 3 months ago
Model-checking behavioral programs
System specifications are often structured as collections of scenarios and use-cases that describe desired and forbidden sequences of events. A recently proposed behavioral progr...
David Harel, Robby Lampert, Assaf Marron, Gera Wei...
PFE
2001
Springer
15 years 8 months ago
Easing the Transition to Software Mass Customization
Although software mass customization offers the potential for order-of-magnitude improvements in software engineering performance, the up-front cost, level of effort, assumed risk,...
Charles W. Krueger
130
Voted
SEKE
2004
Springer
15 years 9 months ago
Integrating Security Administration into Software Architectures Design
Software architecture plays a central role in developing software systems that satisfy functionality and security requirements. However, little has been done to integrate system d...
Huiqun Yu, Xudong He, Yi Deng, Lian Mo