The Future of Authentication

Posted by Dirk Balfanz, Richard Chow, Ori Eisen, Markus Jakobsson, Steve Kirsch, Scott Matsumoto, Jesus Molina, Paul van Oorschot on  May 04, 2012

In this IEEE roundtable discussion article, the panelists discuss current authentication approaches, how to authenticate users on mobile devices and the future direction of authentication. 1

Software Engineering Meets Evolutionary Computation

Posted by Mark Harman on  Apr 16, 2012

In this IEEE article, author Mark Harman talks about evolutionary computation and search-based software engineering (SBSE) techniques that can be used to solve problems in software engineering.

Verification and Validation for Trustworthy Software Systems

Posted by James Bret Michael, Doron Drusinsky, Thomas W. Otani, and Man-Tak Shing on  Mar 05, 2012

In this IEEE article, authors discuss a continuous verification and validation of complex and safety-critical software systems.

Pattern-Based Architecture Reviews

Posted by Neil B. Harrison and Paris Avgeriou on  Feb 14, 2012

In this article, authors Neil Harrison and Paris Avgeriou discuss a pattern-based architecture review process to help with quality attributes as well as agile practices like frequent releases. 1

Codesign Challenges for Exascale Systems: Performance, Power, and Reliability

Posted by Darren J. Kerbyson, Abhinav Vishnu, Kevin J. Barker, and Adolfy Hoisie on  Jan 17, 2012

In this IEEE article, authors talks about how a codesign methodology using modeling can benefit exascale computing systems with improved performance, power efficiency, and reliability.

Software Engineering Meets Services and Cloud Computing

Posted by Stephen S. Yau and Ho G. An on  Jan 04, 2012

In this IEEE article, authors Stephen Yau and Ho An talk about the advantages and challenges in application development using service-oriented architecture and cloud computing technologies. 1

Comparison of Intrusion Tolerant System Architectures

Posted by Quyen L. Nguyen and Arun Sood on  Nov 25, 2011

In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system architectures and their efficiency for intrusion tolerance and survivability. 1

Developer-Driven Threat Modeling

Posted by Danny Dhillon on  Nov 11, 2011

In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats based on the dataflow diagrams for assessing and mitigating the security risks. 1

Mobile Attacks and Defense

Posted by Charlie Miller on  Oct 17, 2011

In this IEEE article, author Charlie Miller talks about mobile security vulnerabilities. He discusses how iOS and Android phones can be attacked using mobile malware and drive-by downloads.

General Feedback
Marketing and all content copyright © 2006-2015 C4Media Inc. hosted at Contegix, the best ISP we've ever worked with.
Privacy policy