Sciweavers

2213 search results - page 5 / 443
» Software Security
Sort
View
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 6 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...
WETICE
2003
IEEE
15 years 5 months ago
Software Security Checklist for the Software Life Cycle
A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development...
David P. Gilliam, Thomas L. Wolfe, Joseph S. Sheri...
ISPEC
2005
Springer
15 years 5 months ago
Secure Software Delivery and Installation in Embedded Systems
ded abstract of this technical report appeared in the Proceedings of the First Information Security Practice and Experience Conference (ISPEC 2005) [AHS05].
André Adelsbach, Ulrich Huber, Ahmad-Reza S...