Sciweavers

IEEESP
2006
55views more  IEEESP 2006»
13 years 4 months ago
Speaking of Privacy
Carl E. Landwehr
IEEESP
2006
50views more  IEEESP 2006»
13 years 4 months ago
RFID malware: truth vs. myth
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
IEEESP
2006
47views more  IEEESP 2006»
13 years 4 months ago
Web services policies
Anne Anderson
IEEESP
2006
54views more  IEEESP 2006»
13 years 4 months ago
Weak Links, Strong Ties
George Cybenko
IEEESP
2006
54views more  IEEESP 2006»
13 years 4 months ago
Putting the tools to work: how to succeed with source code analysis
Pravir Chandra, Brian Chess, John Steven
IEEESP
2006
108views more  IEEESP 2006»
13 years 4 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
IEEESP
2006
64views more  IEEESP 2006»
13 years 4 months ago
Desert Island Books
Eugene H. Spafford
IEEESP
2006
53views more  IEEESP 2006»
13 years 4 months ago
Fitting Square Pegs into Round Holes
Luther Martin