Sciweavers

25 search results - page 3 / 5
» An approach to engineer and enforce context constraints in a...
Sort
View
COMPSAC
2010
IEEE
13 years 2 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
COMPSAC
2010
IEEE
13 years 3 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
ICIP
2010
IEEE
13 years 3 months ago
An integer programming approach to visual compliance
Visual compliance has emerged as a new paradigm to ensure that employees comply with processes and policies in a business context [1]. In this paper, we focus on videos from retai...
Lei Ding, Quanfu Fan, Sharath Pankanti
COMPSAC
2006
IEEE
13 years 11 months ago
Automated Agent Synthesis for Situation Awareness in Service-Based Systems
Service-based systems have many applications, such as collaborative research and development, e-business, health care, military applications, and homeland security. In dynamic ser...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...
ENASE
2009
131views Hardware» more  ENASE 2009»
13 years 3 months ago
Flexible Composites and Automatic Component Selection for Service-Based Applications
In traditional Software Engineering approaches, an application is described as a composite entity containing all its components. This approach is no longer relevant in modern Softw...
Jacky Estublier, Idrissa A. Dieng, Eric Simon, Ger...