Sciweavers

5843 search results - page 144 / 1169
» Software Security in Practice
Sort
View
JPDC
2006
83views more  JPDC 2006»
15 years 4 months ago
Virtual Leashing: Creating a computational foundation for software protection
We introduce Virtual Leashing,1 a new technique for software protection and control. The leashing process removes small fragments of code, pervasive throughout the application, an...
Ori Dvir, Maurice Herlihy, Nir Shavit
ASWEC
2008
IEEE
15 years 11 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
CSI
2007
96views more  CSI 2007»
15 years 4 months ago
A common criteria based security requirements engineering process for the development of secure information systems
In order to develop security critical Information Systems, specifying security quality requirements is vitally important, although it is a very difficult task. Fortunately, there ...
Daniel Mellado, Eduardo Fernández-Medina, M...
ETFA
2005
IEEE
15 years 10 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
AGILEDC
2004
IEEE
15 years 8 months ago
A Study Case: Evolution of Co-Location and Planning Strategy
Agile practices can and should be evolved throughout a project. This paper focuses on the evolution of two agile practices, namely co-location and planning strategy, in a software...
Amy Law, Allen Ho