Sciweavers

2236 search results - page 300 / 448
» Secure Software Design in Practice
Sort
View
DS
1997
104views Database» more  DS 1997»
14 years 11 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi
IEEESP
2006
108views more  IEEESP 2006»
14 years 10 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
ASPLOS
2008
ACM
15 years 4 min ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
PRIMA
2009
Springer
15 years 4 months ago
An Empirical Study of Agent Programs
Agent-oriented programming has been motivated in part by the conception that high-level programming constructs based on common tions such as beliefs and goals provide appropriate a...
M. Birna van Riemsdijk, Koen V. Hindriks
AGILEDC
2008
IEEE
15 years 4 months ago
Utilizing Digital Tabletops in Collocated Agile Planning Meetings
In agile software development, planning meetings play a pivotal role in establishing a concrete understanding of customers’ requirements. Using tools to enhance the effectivenes...
Yaser Ghanam, Xin Wang, Frank Maurer