Sciweavers

59 search results - page 8 / 12
» cc 2006
Sort
View
ASWEC
2006
IEEE
15 years 3 months ago
Assessing Security Properties of Software Components: A Software Engineer's Perspective
The paper proposes an assessment scheme for the security properties of software components. The proposed scheme consists of three stages: (i) a system-specific security requireme...
Khaled M. Khan, Jun Han
CCGRID
2006
IEEE
15 years 3 months ago
Transparent Adaptive Library-Based Checkpointing for Master-Worker Style Parallelism
We present a transparent, system-level checkpointing solution for master-worker parallelism that automatically adapts, upon restart, to the number of processor nodes available. Th...
Gene Cooperman, Jason Ansel, Xiaoqin Ma
CSREASAM
2006
14 years 11 months ago
Secure E-commerce Protection Profile
We present a Secure E-commerce Protection Profile (SEPP) that captures security requirements for securing sessions in the e-commerce operational environment. The SEPP is prepared ...
Anil Kumar Venkataiahgari, Mourad Debbabi, J. Will...
ISJGP
2007
89views more  ISJGP 2007»
14 years 9 months ago
Trends in Security Product Evaluations
Government-endorsed security evaluations, like those performed under the Common Criteria (CC), use established techniques of software quality assurance to try to evaluate product ...
Richard E. Smith
CC
2006
Springer
125views System Software» more  CC 2006»
15 years 1 months ago
Path-Based Reuse Distance Analysis
Abstract. Profiling can effectively analyze program behavior and provide critical information for feedback-directed or dynamic optimizations. Based on memory profiling, reuse dista...
Changpeng Fang, Steve Carr, Soner Önder, Zhen...