Sciweavers

8623 search results - page 210 / 1725
» Software engineering for secure systems
Sort
View
IASTEDSE
2004
15 years 5 months ago
Security and reliability challenges in component-based software for consumer devices
Consumer devices have domain specific constraints imposed by end-users, device manufacturers and service providers. These constraints focus on the need for security and reliabilit...
Stefano Campadello, Ronan MacLaverty, Titos Sarida...
APSEC
2007
IEEE
15 years 8 months ago
Deriving Software Process Simulation Model from SPEM-based Software Process Model
It is difficult to adopt a simulation technology for simulating a software process because of the difficulty in developing a simulation model. In order to resolve the difficulty, ...
Seunghun Park, KeungSik Choi, Kyung-A Yoon, Doo-Hw...
TASE
2008
IEEE
15 years 4 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
COMPSAC
2000
IEEE
15 years 9 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...
COMPSAC
2009
IEEE
15 years 8 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi