Sciweavers

4923 search results - page 209 / 985
» Software Risk Management
Sort
View
COMPSEC
2004
105views more  COMPSEC 2004»
15 years 4 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
AISS
2010
165views more  AISS 2010»
15 years 2 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
TELSYS
2010
140views more  TELSYS 2010»
14 years 11 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
142
Voted
LISA
1998
15 years 6 months ago
SEPP: Software Installation and Sharing System
SEPP is an application installation, sharing and packaging solution for large, decentrally managed Unix environments. SEPP can be used without making modifications to the organiza...
Tobias Oetiker
CAISE
2006
Springer
15 years 8 months ago
Ethical Responsibility of the Software Engineer
Among the various contemporary schools of moral thinking, consequence-based ethics, as opposed to rule-based, seems to have a good acceptance among professionals such as software e...
Gonzalo Génova, M. Rosario González,...