Sciweavers

8623 search results - page 215 / 1725
» Software engineering for secure systems
Sort
View
OOPSLA
2007
Springer
15 years 10 months ago
Living in the comfort zone
A comfort zone is a tested region of a system’s input space within which it has been observed to behave acceptably. To keep systems operating within their comfort zones, we advo...
Martin C. Rinard
ICSE
1997
IEEE-ACM
15 years 8 months ago
Rigi: A Visualization Environment for Reverse Engineering
The Rigi reverse engineering system provides two contrasting approaches for presenting software structures in its graph editor. The rst displays the structures through multiple, i...
Margaret-Anne D. Storey, Kenny Wong, Hausi A. M&uu...
CC
2005
Springer
15 years 10 months ago
A Compiler-Based Approach to Data Security
Feihui Li, Guilin Chen, Mahmut T. Kandemir, Richar...
IFIP
1998
Springer
15 years 8 months ago
Security Requirements for Mobile Agents in Electronic Markets
Abstract. In this article we identify security threats and requirements for software agent systems in the context of an electronic market. A short description of our own agent syst...
Michael Zapf, Helge Müller, Kurt Geihs
SECURWARE
2008
IEEE
15 years 11 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...