Sciweavers

657 search results - page 66 / 132
» Secure and Usable Requirements Engineering
Sort
View
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 4 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
FC
2007
Springer
106views Cryptology» more  FC 2007»
15 years 4 months ago
Dynamic Virtual Credit Card Numbers
Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credi...
Ian Molloy, Jiangtao Li, Ninghui Li
BDIM
2008
IEEE
185views Business» more  BDIM 2008»
15 years 4 months ago
Addressing the impact of business process changes on software user interfaces
—This paper defines an approach to maintain the work of business process analysts aligned with the work of UI designers. With this approach, models are derived from each other an...
Kênia Soares Sousa, Hildeberto Mendonç...
WISES
2003
14 years 11 months ago
Adding Hard Real-time Capabilities to CORBA
Abstract — Control systems are often software-intensive applications that are becoming extremely complex as new functionality is required. Complexity is a real engineering challe...
Thomas Losert
AGENTS
1999
Springer
15 years 2 months ago
Agent Aided Aircraft Maintenance
Aircraft maintenance is performed by mechanics who are required, by regulation, to consult expert engineers for repair instructions and approval. In addition to their own experien...
Onn Shehory, Katia P. Sycara, Gita Sukthankar, Vic...