Sciweavers

2236 search results - page 161 / 448
» Secure Software Design in Practice
Sort
View
UML
2000
Springer
15 years 7 months ago
Towards a UML profile for interaction design: the Wisdom approach
The UML is recognized to be the dominant diagrammatic modeling language in the software industry. However, it's support for building interactive systems is still acknowledged ...
Nuno Jardim Nunes, João Falcão e Cun...
OOPSLA
2009
Springer
15 years 10 months ago
Language factories
Programming languages are the primary mechanism by which software is created, yet most of us have access to only a few, fixed, programming languages. Any problem we wish to expre...
Tony Clark, Laurence Tratt
EUROPKI
2005
Springer
15 years 9 months ago
CA-in-a-Box
An enterprise (such as an institute of higher education) wishing to deploy PKI must choose between several options, all expensive and awkward. It might outsource certification to ...
Mark Franklin, Kevin Mitcham, Sean W. Smith, Joshu...
ISSE
2010
15 years 2 months ago
A second look at Faster, Better, Cheaper
“Faster, Better, Cheaper” (FBC) was a systems development methodology used by NASA in the 1990s. While usually a deprecated practice, we find that, with certain caveats, it is...
Oussama El-Rawas, Tim Menzies
ACSAC
2007
IEEE
15 years 10 months ago
Secure and Flexible Monitoring of Virtual Machines
The monitoring of virtual machines has many applications in areas such as security and systems management. A monitoring technique known as introspection has received significant ...
Bryan D. Payne, Wenke Lee