Sciweavers

5843 search results - page 3 / 1169
» Software Security in Practice
Sort
View
PLDI
2009
ACM
14 years 2 days ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...
OOPSLA
2009
Springer
13 years 12 months ago
The commenting practice of open source
The development processes of open source software are different from traditional closed source development processes. Still, open source software is frequently of high quality. Th...
Oliver Arafat, Dirk Riehle
QSIC
2007
IEEE
13 years 11 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao
OOPSLA
2004
Springer
13 years 10 months ago
Empirical investigation of the impact of extreme programming practices on software projects
Extreme Programming (XP) is an agile software development methodology composed of several practices that purportedly yield high quality and high customer satisfaction. However, th...
Lucas Layman
CSREASAM
2006
13 years 6 months ago
The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless Services
- In the paper, the generic vulnerability of security software solution is depicted. For selected wireless services such as Device Management, Digital Rights Management and M-Payme...
Rongzhen Yang, Liang He, Shoufeng Yang, Forni Gary...