Sciweavers

2213 search results - page 73 / 443
» Software Security
Sort
View
MIDDLEWARE
2004
Springer
15 years 8 months ago
Security requirements in service oriented architectures for ubiquitous computing
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Domenico Cotroneo, Almerindo Graziano, Stefano Rus...
IFIP
1998
Springer
15 years 7 months ago
Security Requirements for Mobile Agents in Electronic Markets
Abstract. In this article we identify security threats and requirements for software agent systems in the context of an electronic market. A short description of our own agent syst...
Michael Zapf, Helge Müller, Kurt Geihs
SP
2005
IEEE
183views Security Privacy» more  SP 2005»
15 years 8 months ago
A Generic Attack on Checksumming-Based Software Tamper Resistance
Self-checking software tamper resistance mechanisms employing checksums, including advanced systems as recently proposed by Chang and Atallah (2002) and Horne et al. (2002), have ...
Glenn Wurster, Paul C. van Oorschot, Anil Somayaji
OOPSLA
2007
Springer
15 years 9 months ago
Towards a framework for requirement change management in healthcare software applications
Requirements volatility is an issue in software development life cycle which often originated from our incomplete knowledge about the domain of interest. In this paper, we propose...
Arash Shaban-Nejad, Volker Haarslev
COMPSEC
2002
134views more  COMPSEC 2002»
15 years 2 months ago
The Open Source approach opportunities and limitations with respect to security and privacy
Today
Marit Hansen, Kristian Köhntopp, Andreas Pfit...