Software risk management
Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Developing multimedia applications with the WinWin spiral model
ESEC '97/FSE-5 Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering
Computer
Design of Intelligence Mobile Agent Lifecycle for the Progress Management and Mobile Computing
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Design Agent for the Reliable Web Security Requirement Control
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Design of the architecture for agent of the personality security in the ubiquitous environment
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Hi-index | 0.00 |
This paper estimates the development of a security process in four cases. This paper is intended to help the design lifecycle and progress management in ISO/IEC 15408 (Common Criteria). There are many defects that cause the security requirement problems during the software development. This paper explores the areas of the lifecycle and progress management that remove the security requirements and also manage the schedule and quality problems. For projects in similar domains, it is possible to remove security risk items and to manage progress by using security lifecycle and progress milestone, which can greatly improve the software process.