Zobrazeno 1 - 10
of 70
pro vyhledávání: '"Michael VanHilst"'
Publikováno v:
MSR
In this paper, we propose to apply artifact mining in a global development environment to support measurement based process management and improvement, such as SEI/CMMI's GQ(I)M and Six Sigma's DMAIC. CMM has its origins in managing large software pr
Autor:
Michael VanHilst, Ed Suarez-Rivero, James J. Mulcahy, Shihong Huang, Douglas Harwood, Wayne W. Ballantyne
Publikováno v:
IRI
Project management and process improvement are a critical part of software development in an organization, especially for large scale and long-lived software. Metrics can be used as one of the means to evaluate this process. However, traditional meth
Publikováno v:
ARES
Publikováno v:
International Journal of Computers and Applications. 33
The study of repository data has yielded insight into the behaviour of developers and qualities of software artifacts. In this article, we use repository data to investigate the nature and quality ...
Autor:
Nobukazu Yoshioka, Michael VanHilst, Guenther Pernul, Jan Jürjens, Eduardo B. Fernandez, Hironori Washizaki
This chapter describes ongoing work on the use of patterns in the development of secure systems. The work reflects a collaboration among five research centers on three continents. Patterns are applied to all aspects of development, from domain analys
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8ebf6c51de82b52847431ebfa2b8374e
https://doi.org/10.4018/978-1-61520-837-1.ch002
https://doi.org/10.4018/978-1-61520-837-1.ch002
Publikováno v:
PLoP
Sensors are widely used in everyday life in household appliances, fire alarms, traffic control systems, battlefields, banks, and museums. Sensors are used either as standalone devices or in networks. Understanding the basic structure of a sensor node
Publikováno v:
ARES
It is possible to reasonably measure the security quality of individual security patterns. However, more interesting is to ask: Can we show that a system built using security patterns is secure in some sense? We discuss here some issues about evaluat
Publikováno v:
DEXA Workshops
In previous work we introduced an approach for finding security requirements based on misuse activities (actions). This method starts from the activity diagram of a use case (or a sequence of use cases). Each activity is analyzed to see how it could
Publikováno v:
Proceedings of the 6th International Workshop on Security in Information Systems.
This paper presents a classification for security patterns that addresses the needs of users. The approach uses a matrix defined by dividing the problem space along multiple dimensions, and allows patterns to occupy regions, defined by multiple cells
We are developing a methodology to build secure software for complex applications and its related support. This methodology considers the whole software lifecycle, uses security patterns, and is applied at all the architectural levels of the system.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c690406aa46da6151da0cc06af59015a
https://doi.org/10.4018/978-1-59904-147-6.ch005
https://doi.org/10.4018/978-1-59904-147-6.ch005