Sciweavers

78 search results - page 14 / 16
» Defining and Checking Deployment Contracts for Software Comp...
Sort
View
CCS
2010
ACM
13 years 9 days ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
ICSE
2005
IEEE-ACM
14 years 5 months ago
An adaptive object model with dynamic role binding
To achieve the goalof realizingobject adaptationto environments, a new role-based model Epsilon and a language EpsilonJ is proposed. In Epsilon, an environment is defined as a fie...
Tetsuo Tamai, Naoyasu Ubayashi, Ryoichi Ichiyama
TSE
2008
165views more  TSE 2008»
13 years 5 months ago
A Systematic Study of Failure Proximity
Software end users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure repor...
Chao Liu 0001, Xiangyu Zhang, Jiawei Han
EUROSYS
2006
ACM
14 years 2 months ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
ACMSE
2006
ACM
13 years 11 months ago
Automatic support for testing web-based enterprise applications
In this paper we consider the problem of automatically generating test suites associated with web-based enterprise systems. In particular, we discuss the construction of a tool de...
Arturo Sanchez, Brandon Vega, Alexander Gonzalez, ...