Sciweavers

577 search results - page 2 / 116
» Engineering Sufficiently Secure Computing
Sort
View
84
Voted
AC
2003
Springer
15 years 6 months ago
Modeling Complexity in Secure Distributed Computing
Christian Cachin
85
Voted
AC
1997
Springer
15 years 5 months ago
Introduction to Computer Security
Bart De Decker
112
Voted
TSE
2008
107views more  TSE 2008»
15 years 1 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
83
Voted
ACSAC
2005
IEEE
15 years 6 months ago
We Need Assurance!
When will we be secure? Nobody knows for sure – but it cannot happen before commercial security products and services possess not only enough functionality to satisfy customersâ...
Brian D. Snow
146
Voted
SIGSOFT
2010
ACM
14 years 11 months ago
Multiplicity computing: a vision of software engineering for next-generation computing platform applications
New technologies have recently emerged to challenge the very nature of computing: multicore processors, virtualized operating systems and networks, and data-center clouds. One can...
Cristian Cadar, Peter Pietzuch, Alexander L. Wolf