BT

Verification and Validation for Trustworthy Software Systems

Posted by James Bret Michael, Doron Drusinsky, Thomas W. Otani, and Man-Tak Shing on  Mar 05, 2012

In this IEEE article, authors discuss a continuous verification and validation of complex and safety-critical software systems.

Pattern-Based Architecture Reviews

Posted by Neil B. Harrison and Paris Avgeriou on  Feb 14, 2012

In this article, authors Neil Harrison and Paris Avgeriou discuss a pattern-based architecture review process to help with quality attributes as well as agile practices like frequent releases. 1

Codesign Challenges for Exascale Systems: Performance, Power, and Reliability

Posted by Darren J. Kerbyson, Abhinav Vishnu, Kevin J. Barker, and Adolfy Hoisie on  Jan 17, 2012

In this IEEE article, authors talks about how a codesign methodology using modeling can benefit exascale computing systems with improved performance, power efficiency, and reliability.

Software Engineering Meets Services and Cloud Computing

Posted by Stephen S. Yau and Ho G. An on  Jan 04, 2012

In this IEEE article, authors Stephen Yau and Ho An talk about the advantages and challenges in application development using service-oriented architecture and cloud computing technologies. 2

Comparison of Intrusion Tolerant System Architectures

Posted by Quyen L. Nguyen and Arun Sood on  Nov 25, 2011

In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system architectures and their efficiency for intrusion tolerance and survivability. 3

Developer-Driven Threat Modeling

Posted by Danny Dhillon on  Nov 11, 2011

In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats based on the dataflow diagrams for assessing and mitigating the security risks. 3

Mobile Attacks and Defense

Posted by Charlie Miller on  Oct 17, 2011

In this IEEE article, author Charlie Miller talks about mobile security vulnerabilities. He discusses how iOS and Android phones can be attacked using mobile malware and drive-by downloads.

Resilient Security Architecture

Posted by John Diamant on  Sep 27, 2011

In this IEEE article, author John Diamant talks about improving security quality of software applications using techniques like security requirements gap analysis and architectural threat analysis.

Controlling and Steering Open Source Projects

Posted by Dirk Riehle on  Sep 12, 2011

In this IEEE article, author Dirk Riehle discusses how commercial software firms can control or steer open source projects to meet their business needs.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2013 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT