Sciweavers

1770 search results - page 53 / 354
» Writing requirements in computer security
Sort
View
APSEC
2003
IEEE
14 years 1 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens
OOPSLA
2005
Springer
14 years 1 months ago
AutAT: an eclipse plugin for automatic acceptance testing of web applications
In this paper we describe AutAT, an open source Eclipse plugin to better enable test driven development of web applications. AutAT lets non-technical people write acceptance tests...
Christian Schwarz, Stein Kåre Skytteren, Tro...
WISEC
2010
ACM
14 years 1 months ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 11 months ago
Secure Multiparty AES
Abstract We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expe...
Ivan Damgård, Marcel Keller
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
14 years 16 days ago
Automatic contention detection and amelioration for data-intensive operations
To take full advantage of the parallelism offered by a multicore machine, one must write parallel code. Writing parallel code is difficult. Even when one writes correct code, the...
John Cieslewicz, Kenneth A. Ross, Kyoho Satsumi, Y...