Sciweavers

283 search results - page 2 / 57
» Software Inspections We Can Trust
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
13 years 9 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
ASPLOS
2008
ACM
13 years 7 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
ESEM
2007
ACM
13 years 9 months ago
A Replicate Empirical Comparison between Pair Development and Software Development with Inspection
In 2005, we studied the development effort and effect of quality comparisons between software development with Fagan's inspection and pair development. Three experiments were...
Monvorath Phongpaibul, Barry W. Boehm
IEEEARES
2009
IEEE
13 years 3 months ago
Software Inspections Using Guided Checklists to Ensure Security Goals
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the syste...
Frank Elberzhager, Alexander Klaus, Marek Jawurek
IASTEDSE
2004
13 years 6 months ago
Does active guidance improve software inspections? A preliminary empirical study
Inspections are an established quality assurance technique. In order to optimize the inspection approach, different reading techniques, such as checklist-based reading and scenari...
Christian Denger, Marcus Ciolkowski, Filippo Lanub...