Sciweavers

2236 search results - page 249 / 448
» Secure Software Design in Practice
Sort
View
152
Voted
WWW
2006
ACM
16 years 3 months ago
Capturing the essentials of federated systems
Today, the Web is increasingly used as a platform for distributed services, which transcend organizational boundaries to form federated applications. Consequently, there is a grow...
Alexander Brändle, Frederic Majer, Johannes M...
121
Voted
CHI
2010
ACM
15 years 8 months ago
The true cost of unusable password policies: password use in the wild
HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We pr...
Philip Inglesant, Martina Angela Sasse
QOSA
2007
Springer
15 years 9 months ago
The Architect's Mindset
Abstract. Software architecture and software architecture practices become increasingly important for information systems since they enable reasoning on the design of the system. T...
Viktor Clerc, Patricia Lago, Hans van Vliet
PPPJ
2006
ACM
15 years 9 months ago
Experiences with the development of a reverse engineering tool for UML sequence diagrams: a case study in modern Java developmen
The development of a tool for reconstructing UML sequence diagrams from executing Java programs is a challenging task. We implemented such a tool designed to analyze any kind of J...
Matthias Merdes, Dirk Dorsch
SIGSOFT
2003
ACM
16 years 4 months ago
Tracking pointers with path and context sensitivity for bug detection in C programs
This paper proposes a pointer alias analysis for automatic error detection. State-of-the-art pointer alias analyses are either too slow or too imprecise for finding errors in real...
V. Benjamin Livshits, Monica S. Lam