Sciweavers

577 search results - page 2 / 116
» Engineering Sufficiently Secure Computing
Sort
View
98
Voted
AC
1997
Springer
15 years 7 months ago
Introduction to Computer Security
Bart De Decker
122
Voted
TSE
2008
107views more  TSE 2008»
15 years 2 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
94
Voted
ACSAC
2005
IEEE
15 years 8 months ago
We Need Assurance!
When will we be secure? Nobody knows for sure – but it cannot happen before commercial security products and services possess not only enough functionality to satisfy customersâ...
Brian D. Snow
167
Voted
SIGSOFT
2010
ACM
15 years 18 days ago
Multiplicity computing: a vision of software engineering for next-generation computing platform applications
New technologies have recently emerged to challenge the very nature of computing: multicore processors, virtualized operating systems and networks, and data-center clouds. One can...
Cristian Cadar, Peter Pietzuch, Alexander L. Wolf