Sciweavers

8503 search results - page 263 / 1701
» Secure Software Architectures
Sort
View
IWPC
2002
IEEE
15 years 9 months ago
Architecture Recovery of Dynamically Linked Applications: A Case Study
Most previously published case studies in architecture recovery have been performed on statically linked software systems. Due to the increase in use of middleware technologies, s...
Igor Ivkovic, Michael W. Godfrey
CAISE
2003
Springer
15 years 10 months ago
An Administration Console for the CSAP System
Our group is involved in the European funded Webocracy project in which an e-government system called Webocrat has been designed and implemented. Our responsibility is to provide m...
Fredj Dridi, Björn Muschall, Günther Per...
CHI
2008
ACM
16 years 5 months ago
Talc: using desktop graffiti to fight software vulnerability
With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...
IEEEARES
2010
IEEE
15 years 9 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
HICSS
2009
IEEE
138views Biometrics» more  HICSS 2009»
15 years 8 months ago
E-Voting System Security Optimization
Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holi...
Barbara Ondrisek