Sciweavers

657 search results - page 78 / 132
» Secure and Usable Requirements Engineering
Sort
View
ICSM
2006
IEEE
15 years 3 months ago
Reengineering User Interfaces of E-Commerce Applications Using Business Processes
E-commerce applications are designed to streamline the business processes for an organization. Graphical user interfaces allow business users to perform daily business activities ...
Qi Zhang, Rongchao Chen, Ying Zou
SAC
2006
ACM
15 years 3 months ago
Distributed context management in a mobility and adaptation enabling middleware (MADAM)
CT As computing devices are getting smaller, we tend to bring them everywhere. Consequently the operating conditions of the devices are constantly changing (e.g. changing user requ...
Marius Mikalsen, Nearchos Paspallis, Jacqueline Fl...
ASWEC
2010
IEEE
14 years 10 months ago
Model-Centered Customizable Architectural Design Decisions Management
—Architectural Design Decisions (ADD) form a key element of Architectural Knowledge (AK), which plays a vital role in the software architecture process. To help manage ADDs, seve...
Lianping Chen, Muhammad Ali Babar, Haiqi Liang
IDTRUST
2010
ACM
15 years 4 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
87
Voted
ACSAC
2002
IEEE
15 years 2 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson