Sciweavers

5843 search results - page 184 / 1169
» Software Security in Practice
Sort
View
GROUP
2010
ACM
15 years 2 months ago
Design methods as discourse on practice
In this paper, we present a view of design methods as discourse on practice. We consider how the deployment of a particular set of design methods enables and constrains not only p...
Marisa Leavitt Cohn, Susan Elliott Sim, Paul Douri...
130
Voted
PROFES
2004
Springer
15 years 10 months ago
Requirements Prioritization Challenges in Practice
Requirements prioritization is recognized as an important activity in product development. In this paper, we describe the current state of requirements prioritization practices in ...
Laura Lehtola, Marjo Kauppinen, Sari Kujala
DGO
2003
118views Education» more  DGO 2003»
15 years 6 months ago
Enabling Email Confidentiality through the use of Opportunistic Encryption
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Simson L. Garfinkel
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 5 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
IVIC
2009
Springer
15 years 11 months ago
Are Visual Informatics Actually Useful in Practice: A Study in a Film Studies Context
This paper describes our work in examining the question of whether providing a visual informatics application in an educational scenario, in particular, providing video content ana...
Nazlena Mohamad Ali, Alan F. Smeaton