Sciweavers

126 search results - page 19 / 26
» Using UMLsec and goal trees for secure systems development
Sort
View
IR
2006
14 years 9 months ago
A relatedness analysis of government regulations using domain knowledge and structural organization
The complexity and diversity of government regulations make understanding and retrieval of regulations a non-trivial task. One of the issues is the existence of multiple sources o...
Gloria T. Lau, Kincho H. Law, Gio Wiederhold
CCS
2006
ACM
15 years 1 months ago
TCG inside?: a note on TPM specification compliance
The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the secu...
Ahmad-Reza Sadeghi, Marcel Selhorst, Christian St&...
PERCOM
2005
ACM
15 years 9 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
ICSM
2002
IEEE
15 years 2 months ago
An Approach to Classify Software Maintenance Requests
When a software system critical for an organization exhibits a problem during its operation, it is relevant to fix it in a short period of time, to avoid serious economical losse...
Giuseppe A. Di Lucca, Massimiliano Di Penta, Sara ...
DSN
2008
IEEE
14 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu