Sciweavers

5843 search results - page 123 / 1169
» Software Security in Practice
Sort
View
CISSE
2008
Springer
15 years 6 months ago
Knowledge Assessment - Practical Example in Testing
: Knowledge assessment is inseparable part of current e-learning technologies. It can be used for self-assessment of students to give them feedback about their progress in a study ...
Ján Genci
ICSM
2003
IEEE
15 years 9 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
131
Voted
DIMVA
2008
15 years 5 months ago
Expanding Malware Defense by Securing Software Installations
Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of...
Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkat...
SOCO
2008
Springer
15 years 4 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
ESEM
2010
ACM
15 years 2 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams