Sciweavers

3792 search results - page 18 / 759
» Techniques for Trusted Software Engineering
Sort
View
SOCO
2008
Springer
13 years 9 months ago
Soft computing techniques for web services brokering
Roy Ladner, Frederick E. Petry, Kalyan Moy Gupta, ...
ACSAC
2005
IEEE
14 years 3 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler
ATC
2007
Springer
14 years 4 months ago
An Approach to a Trustworthy System Architecture Using Virtualization
We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group ...
Frederic Stumpf, Michael Benz, Martin Hermanowski,...
COMPSAC
2002
IEEE
14 years 2 months ago
Multi-Criteria Preference Analysis for Systematic Requirements Negotiation
Many software projects have failed because their requirements were poorly negotiated among stakeholders. This paper proposes a systematic model, called "MultiCriteria Prefere...
Hoh Peter In, David Olson, Tom Rodgers