Sciweavers

1564 search results - page 2 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
IEEESP
2010
77views more  IEEESP 2010»
13 years 4 months ago
Voice-over-IP Security: Research and Practice
Angelos D. Keromytis
IEEESP
2011
13 years 15 days ago
Software Security in Practice
Brian Chess, Brad Arkin
ICDE
1999
IEEE
114views Database» more  ICDE 1999»
14 years 6 months ago
Universal Temporal Extensions for Database Languages
Temporal reasoning and temporal query languages present di cult research problems of theoretical interest and practical importance. One problem is the chasm between point-based te...
Cindy Xinmin Chen, Carlo Zaniolo
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
12 years 9 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
IEEEARES
2008
IEEE
13 years 12 months ago
Secure Software Design in Practice
Per Håkon Meland, Jostein Jensen