Dependability

Results: 351



#Item
261Achieving a rich, safe, and secure “Advanced Information Society” Overview: Interim Report of the “Study Forum for Dependability & Security of Information Systems & Software in the Advanced Information Society”

Achieving a rich, safe, and secure “Advanced Information Society” Overview: Interim Report of the “Study Forum for Dependability & Security of Information Systems & Software in the Advanced Information Society”

Add to Reading List

Source URL: www.meti.go.jp

Language: English - Date: 2013-01-06 00:57:35
262Executive Summary  Strengthening Efforts to Enhance Dependability and Security of Information System Software ~Toward a rich, safe/secure advanced information society~ -Interim Report-

Executive Summary Strengthening Efforts to Enhance Dependability and Security of Information System Software ~Toward a rich, safe/secure advanced information society~ -Interim Report-

Add to Reading List

Source URL: www.meti.go.jp

Language: English - Date: 2013-01-06 00:57:36
263Part 2 Tackling various subjects to realize the levels of dependability and security of information system software required in a safe and secure advanced information society Chapter 1 Preparation of evaluation/managemen

Part 2 Tackling various subjects to realize the levels of dependability and security of information system software required in a safe and secure advanced information society Chapter 1 Preparation of evaluation/managemen

Add to Reading List

Source URL: www.meti.go.jp

Language: English - Date: 2013-01-06 00:57:34
264January 5, 2009 Trust and Dependability Workshop HICSS 9:00 – 9:15 WELCOME AND OVERVIEW - Dr. Jeffrey Voas, Science Applications International Corporation (moderator) 9:15 – 10:00 Dr. Bill Tonti, IBM “The Electrica

January 5, 2009 Trust and Dependability Workshop HICSS 9:00 – 9:15 WELCOME AND OVERVIEW - Dr. Jeffrey Voas, Science Applications International Corporation (moderator) 9:15 – 10:00 Dr. Bill Tonti, IBM “The Electrica

Add to Reading List

Source URL: www.hicss.hawaii.edu

Language: English - Date: 2008-12-30 14:23:11
265A Security Architecture for Survivability Mechanisms A Dissertation Presented to the Faculty of the School of Engineering and Applied Science

A Security Architecture for Survivability Mechanisms A Dissertation Presented to the Faculty of the School of Engineering and Applied Science

Add to Reading List

Source URL: dependability.cs.virginia.edu

Language: English - Date: 2003-04-02 12:17:44
2663.  Importance of social common awareness related to dependability and security In the midst of fierce competition in enhancing services in the market, the information system software is rapidly becoming larger in scale

3. Importance of social common awareness related to dependability and security In the midst of fierce competition in enhancing services in the market, the information system software is rapidly becoming larger in scale

Add to Reading List

Source URL: www.meti.go.jp

Language: English - Date: 2013-01-06 00:57:34
267MAFTIA - Malicious and Accidental Fault Tolerance for Internet Applications Paulo Esteves Veríssimo University of Lisboa Navigators Research Group, www.navigators.di.fc.ul.pt

MAFTIA - Malicious and Accidental Fault Tolerance for Internet Applications Paulo Esteves Veríssimo University of Lisboa Navigators Research Group, www.navigators.di.fc.ul.pt

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2005-09-26 06:09:54
268Brainstorming BoF about possible proposals for new EU-funded projects TF-CSIRT meeting Valetta, 23 September 2004

Brainstorming BoF about possible proposals for new EU-funded projects TF-CSIRT meeting Valetta, 23 September 2004

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2004-09-27 05:23:28
269

PDF Document

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2013-09-02 07:15:14
270LEGACY SYSTEM SOFTWARE SUSTAINMENT  Identifying Trustworthiness Deficit in Legacy Systems Using the NFR Approach Nary Subramanian, University of Texas at Tyler

LEGACY SYSTEM SOFTWARE SUSTAINMENT Identifying Trustworthiness Deficit in Legacy Systems Using the NFR Approach Nary Subramanian, University of Texas at Tyler

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-01-06 01:55:47