Sciweavers

5843 search results - page 214 / 1169
» Software Security in Practice
Sort
View
134
Voted
ESSOS
2009
Springer
15 years 11 months ago
Toward Non-security Failures as a Predictor of Security Faults and Failures
In the search for metrics that can predict the presence of vulnerabilities early in the software life cycle, there may be some benefit to choosing metrics from the non-security rea...
Michael Gegick, Pete Rotella, Laurie Williams
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 9 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
124
Voted
NSPW
2006
ACM
15 years 11 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
133
Voted
WICSA
2008
15 years 6 months ago
"The 3+1 Views of Architecture (in 3D)": An Amplification of the 4+1 Viewpoint Framework
Processes and techniques for the development of enterprise software are best served when infused with practical experience. Pragmatic reflection on what works and what doesn'...
Mark Kennaley
TCOS
2010
14 years 11 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin