Sciweavers

2236 search results - page 230 / 448
» Secure Software Design in Practice
Sort
View
SOUPS
2005
ACM
15 years 9 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
130
Voted
ESE
2008
88views Database» more  ESE 2008»
15 years 3 months ago
Cooperative method development
The development of methods tools and process improvements is best to be based on the understanding of the development practice to be supported. Qualitative research has been propo...
Yvonne Dittrich, Kari Rönkkö, Jeanette E...
118
Voted
HPDC
2008
IEEE
15 years 9 months ago
Dynasa: adapting grid applications to safety using fault-tolerant methods
Grid applications have been prone to encountering problems such as failures or malicious attacks during execution, due to their distributed and large-scale features. The applicati...
Xuanhua Shi, Jean-Louis Pazat, Eric Rodriguez, Hai...
140
Voted
ETRICS
2006
15 years 7 months ago
Possibilistic Information Flow Control in MAKS and Action Refinement
Abstract. Formal methods emphasizes the need for a top-down approach when developing large reliable software systems. Refinements are map step by step abstract algebraic specificat...
Dieter Hutter
116
Voted
CORR
2010
Springer
109views Education» more  CORR 2010»
15 years 3 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin