Sciweavers

2236 search results - page 154 / 448
» Secure Software Design in Practice
Sort
View
ICSE
2005
IEEE-ACM
16 years 4 months ago
Tool support for just-in-time architecture reconstruction and evaluation: an experience report
The need for software architecture evaluation has drawn considerable attention in recent years. In practice, this is a challenging exercise for two main reasons. First, in deploye...
Ian Gorton, Liming Zhu
SIGSOFT
2005
ACM
15 years 9 months ago
Reuse and variability in large software applications
Reuse has always been a major goal in software engineering, since it promises large gains in productivity, quality and time to market reduction. Practical experience has shown tha...
Jacky Estublier, Germán Vega
ICDCS
2010
IEEE
15 years 1 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
SOUPS
2009
ACM
15 years 10 months ago
Sanitization's slippery slope: the design and study of a text revision assistant
For privacy reasons, sensitive content may be revised before it is released. The revision often consists of redaction, that is, the “blacking out” of sensitive words and phras...
Richard Chow, Ian Oberst, Jessica Staddon
ICSE
2005
IEEE-ACM
15 years 9 months ago
Component-based software engineering for embedded systems
Although attractive, CBD has not been widely adopted in domains of embedded systems. The main reason is inability of these technologies to cope with the important concerns of embe...
Ivica Crnkovic