Sciweavers

283 search results - page 4 / 57
» Software Inspections We Can Trust
Sort
View
96
Voted
SEC
2004
15 years 1 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi
79
Voted
ISESE
2006
IEEE
15 years 5 months ago
Identifying domain-specific defect classes using inspections and change history
We present an iterative, reading-based methodology for analyzing defects in source code when change history is available. Our bottom-up approach can be applied to build knowledge ...
Taiga Nakamura, Lorin Hochstein, Victor R. Basili
AGENTS
2000
Springer
15 years 4 months ago
Experiments in Building Experiential Trust in a Society of Objective-Trust Based Agents
In this paper we develop a notion of “objective trust” for Software Agents, that is trust of, or between, Agents based on actual experiences between those Agents. Experiential ...
Mark Witkowski, Alexander Artikis, Jeremy Pitt
WCRE
2002
IEEE
15 years 4 months ago
Java Quality Assurance by Detecting Code Smells
Software inspection is a known technique for improving software quality. It involves carefully examining the code, the design, and the documentation of software and checking these...
Eva Van Emden, Leon Moonen
130
Voted
JHSN
2006
267views more  JHSN 2006»
14 years 11 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...