Sciweavers

341 search results - page 16 / 69
» A Security Engineering Process based on Patterns
Sort
View
ICDCSW
2005
IEEE
15 years 5 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
EUPROJECTS
2006
Springer
15 years 3 months ago
Applying the MVC Pattern to Generated User Interfaces with a Focus on Audio
The mobile user can interact with devices in the environment using either the devices themselves or a device she carries with her. This requires an adaption of the user interface t...
Dirk Schnelle, Tobias Klug
WWW
2004
ACM
16 years 10 days ago
Web engineering with the visual software circuit board
The Visual Software Circuit Board (VSCB) platform supports a component based development methodology towards the development of software systems. The circuit board design techniqu...
Hovhannes Avoyan, Barry Levine
CCR
2004
79views more  CCR 2004»
14 years 11 months ago
Reverse engineering the Internet
To provide insight into Internet operation and performance, recent efforts have measured various aspects of the Internet, developing and improving measurement tools in the process....
Neil T. Spring, David Wetherall, Thomas E. Anderso...
GI
2009
Springer
14 years 9 months ago
Applying Model-Driven Integration Engineering to e-business - striving towards a framework concept
: Changing business requirements such as providing new business services lead to an ongoing need for fast and flexible adaptation of the underlying information systems and infrastr...
Jens Schenderlein, Sascha Sauer, Tobias Krüge...