Sciweavers

3792 search results - page 19 / 759
» Techniques for Trusted Software Engineering
Sort
View
IEE
2007
120views more  IEE 2007»
13 years 9 months ago
Classification of model transformation techniques used in UML-based Web engineering
Software development techniques are continuously evolving with the goal of solving the main problems that still affect the building and maintenance of software systems: time, cost...
N. Koch
ICSE
2003
IEEE-ACM
14 years 10 months ago
Integration of Usability Techniques into the Software Development Process
Software development organisations are paying more and more attention to the usability of their software products. To raise the usability level of the software product, it is nece...
Xavier Ferré
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
14 years 4 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
CISIS
2010
IEEE
14 years 4 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
ESAS
2007
Springer
14 years 4 months ago
Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
Abstract. Node compromise is a serious threat in wireless sensor networks. Particular in networks which are organized in clusters, nodes acting as cluster heads for many cluster no...
Christoph Krauß, Frederic Stumpf, Claudia M....