Sciweavers

506 search results - page 52 / 102
» Electronic-internet business and security
Sort
View
MKWI
2008
168views Business» more  MKWI 2008»
15 years 1 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
CLEIEJ
2007
86views more  CLEIEJ 2007»
14 years 12 months ago
Requirements Game: Teaching Software Project Management
: Several business areas, like Management and Negotiation, have used games like a didactic way to simulate world reality, to introduce students to the day-to-day generated problems...
Carlos Mario Zapata Jaramillo, Gabriel Awad-Aubad
WWW
2008
ACM
16 years 16 days ago
Better abstractions for secure server-side scripting
bstractions for Secure Server-Side Scripting Dachuan Yu Ajay Chander Hiroshi Inamura Igor Serikov DoCoMo Communications Laboratories USA 3240 Hillview Avenue Palo Alto, CA 94304 {y...
Dachuan Yu, Ajay Chander, Hiroshi Inamura, Igor Se...
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 4 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
NSPW
2004
ACM
15 years 5 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...