Sciweavers

443 search results - page 32 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 6 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
JSS
2002
84views more  JSS 2002»
14 years 11 months ago
COTS-based software development: Processes and open issues
The work described in this paper is an investigation of COTS-based software development within a particular NASA environment, with an emphasis on the processes used. Fifteen proje...
Maurizio Morisio, Carolyn B. Seaman, Victor R. Bas...
EUROSYS
2010
ACM
15 years 9 months ago
Splitter: A Proxy-based Approach for Post-Migration Testing of Web Applications
The benefits of virtualized IT environments, such as compute clouds, have drawn interested enterprises to migrate their applications onto new platforms to gain the advantages of ...
Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shai...
NSPW
2006
ACM
15 years 5 months ago
Dark application communities
In considering new security paradigms, it is often worthwhile to anticipate the direction and nature of future attack paradigms. We identify a class of attacks based on the idea o...
Michael E. Locasto, Angelos Stavrou, Angelos D. Ke...
SIGSOFT
2000
ACM
15 years 4 months ago
Accumulative versioning file system Moraine and its application to metrics environment MAME
It is essential to manage versions of software products created during software development. There are various versioning tools actually used in these days, although most of them ...
Tetsuo Yamamoto, Makoto Matsushita, Katsuro Inoue