Sciweavers

270 search results - page 9 / 54
» Building Software Securely from the Ground Up
Sort
View
IPPS
2009
IEEE
15 years 4 months ago
Portable builds of HPC applications on diverse target platforms
—High-end machines at modern HPC centers are constantly undergoing hardware and system software upgrades – necessitating frequent rebuilds of application codes. The number of p...
Magdalena Slawiñska, Jaroslaw Slawinski, Va...
CHI
2008
ACM
15 years 10 months ago
Talc: using desktop graffiti to fight software vulnerability
With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...
CSFW
2005
IEEE
15 years 3 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
HICSS
2006
IEEE
130views Biometrics» more  HICSS 2006»
15 years 4 months ago
Towards a Methodology for the Development of Integrated IT Infrastructures
In this paper, the authors propose and validate a methodology for the development of integrated Information Technology (IT) infrastructures. The motivation for putting forward a n...
77
Voted
SIGCSE
2009
ACM
82views Education» more  SIGCSE 2009»
15 years 10 months ago
An experience report on the design and delivery of two new software design courses
In this paper, we report on our experience in designing and delivering two new software design courses in the Informatics major at UC Irvine. When the major was created in 2004, i...
Alex Baker, André van der Hoek