Sciweavers

1251 search results - page 189 / 251
» Design of an Early Minicomputer
Sort
View
CAISE
2009
Springer
15 years 7 months ago
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the S...
Haralambos Mouratidis, Ali Sunyaev, Jan Jürje...
79
Voted
MODELS
2009
Springer
15 years 7 months ago
How to compare program comprehension in FOSD empirically: an experience report
There are many different implementation approaches to realize the vision of feature oriented software development, ranging from simple preprocessors, over feature-oriented program...
Janet Feigenspan, Christian Kästner, Sven Ape...
90
Voted
ACSAC
2008
IEEE
15 years 7 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
100
Voted
CSFW
2008
IEEE
15 years 7 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
118
Voted
DATE
2008
IEEE
103views Hardware» more  DATE 2008»
15 years 7 months ago
A Mutation Model for the SystemC TLM 2.0 Communication Interfaces
Mutation analysis is a widely-adopted strategy in software testing with two main purposes: measuring the quality of test suites, and identifying redundant code in programs. Simila...
Nicola Bombieri, Franco Fummi, Graziano Pravadelli