Sciweavers

1795 search results - page 80 / 359
» Security Models and Information Flow
Sort
View
FLAIRS
2000
15 years 1 months ago
The Use of Formal Methods for Trusted Digital Signature Devices
This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Bruno Langenstein, Roland Vogt, Markus Ullmann
TOCS
2002
70views more  TOCS 2002»
14 years 11 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...
PROMISE
2010
14 years 6 months ago
Defect cost flow model: a Bayesian network for predicting defect correction effort
Background. Software defect prediction has been one of the central topics of software engineering. Predicted defect counts have been used mainly to assess software quality and est...
Thomas Schulz, Lukasz Radlinski, Thomas Gorges, Wo...
HICSS
2005
IEEE
153views Biometrics» more  HICSS 2005»
15 years 5 months ago
Developing a Knowledge-Based Organizational Performance Model for Discontinuous Participatory Enterprises
Our research seeks to understand how to extend established organization theory and emerging knowledgeflow theory to inform the design of organizations with discontinuous participa...
Rahinah Ibrahim, Mark E. Nissen
CHI
2008
ACM
15 years 1 months ago
Using information scent to model the dynamic foraging behavior of programmers in maintenance tasks
In recent years, the software engineering community has begun to study program navigation and tools to support it. Some of these navigation tools are very useful, but they lack a ...
Joseph Lawrance, Rachel K. E. Bellamy, Margaret M....