Sciweavers

1548 search results - page 74 / 310
» Estimating Software Vulnerabilities
Sort
View
WWW
2002
ACM
15 years 12 months ago
Abstracting application-level web security
ing Application-Level Web Security David Scott Laboratory For Communications Engineering Engineering Department Trumpington Street Cambridge CB2 1PZ djs55@eng.cam.ac.uk Richard Sha...
David Scott, Richard Sharp
83
Voted
EUROSYS
2007
ACM
15 years 8 months ago
Sweeper: a lightweight end-to-end system for defending against fast worms
The vulnerabilities which plague computers cause endless grief to users. Slammer compromised millions of hosts in minutes; a hit-list worm would take under a second. Recently prop...
Joseph Tucek, James Newsome, Shan Lu, Chengdu Huan...
SOSP
2009
ACM
15 years 8 months ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
IJACTAICIT
2010
151views more  IJACTAICIT 2010»
14 years 6 months ago
The Comparative Study of Software Optimal Release Time Based on Burr Distribution
It is great practical interest to decide when to stop testing a software system in development phase and transfer it to the user. This problem is called as the optimal software re...
Hee-Cheul Kim, Hyoung-Keun Park
ICSE
2004
IEEE-ACM
15 years 11 months ago
Making Resource Decisions for Software Projects
Software metrics should support managerial decision making in software projects. We explain how traditional metrics approaches, such as regression-based models for cost estimation...
Norman E. Fenton, William Marsh, Martin Neil, Patr...