Sciweavers

8623 search results - page 220 / 1725
» Software engineering for secure systems
Sort
View
ASWEC
2009
IEEE
15 years 2 months ago
From Requirements to Embedded Software - Formalising the Key Steps
Failure of a design to satisfy a system's requirements can result in schedule and cost overruns. When using current approaches, ensuring requirements are satisfied is often d...
Toby Myers, R. Geoff Dromey
MSR
2006
ACM
15 years 10 months ago
Concern based mining of heterogeneous software repositories
In the current trend of software engineering, software systems are viewed as clusters of overlapping structures representing various concerns, covering heterogeneous artifacts lik...
Imed Hammouda, Kai Koskimies
ESEM
2009
ACM
15 years 11 months ago
Using security metrics coupled with predictive modeling and simulation to assess security processes
: © Using Security Metrics Coupled with Predictive Modeling and Simulation to Assess Security Processes Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu HP Laborato...
Yolanta Beres, Marco Casassa Mont, Jonathan Griffi...
STORAGESS
2006
ACM
15 years 10 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
ICFEM
2003
Springer
15 years 9 months ago
Service-Based Systems Engineering: Consistent Combination of Services
Using service-based system descriptions simplifies the specification of complex reactive systems as found in the domain of web-services as well as embedded systems. To support a se...
Bernhard Schätz, Chris Salzmann