Sciweavers

341 search results - page 16 / 69
» A Security Engineering Process based on Patterns
Sort
View
ICDCSW
2005
IEEE
15 years 8 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
120
Voted
EUPROJECTS
2006
Springer
15 years 6 months ago
Applying the MVC Pattern to Generated User Interfaces with a Focus on Audio
The mobile user can interact with devices in the environment using either the devices themselves or a device she carries with her. This requires an adaption of the user interface t...
Dirk Schnelle, Tobias Klug
133
Voted
WWW
2004
ACM
16 years 3 months ago
Web engineering with the visual software circuit board
The Visual Software Circuit Board (VSCB) platform supports a component based development methodology towards the development of software systems. The circuit board design techniqu...
Hovhannes Avoyan, Barry Levine
118
Voted
CCR
2004
79views more  CCR 2004»
15 years 2 months ago
Reverse engineering the Internet
To provide insight into Internet operation and performance, recent efforts have measured various aspects of the Internet, developing and improving measurement tools in the process....
Neil T. Spring, David Wetherall, Thomas E. Anderso...
145
Voted
GI
2009
Springer
15 years 15 days ago
Applying Model-Driven Integration Engineering to e-business - striving towards a framework concept
: Changing business requirements such as providing new business services lead to an ongoing need for fast and flexible adaptation of the underlying information systems and infrastr...
Jens Schenderlein, Sascha Sauer, Tobias Krüge...