Sciweavers

30 search results - page 6 / 6
» Specifying and Enforcing High-Level Semantic Obligation Poli...
Sort
View
CCS
2008
ACM
13 years 6 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 3 months ago
Active Integrity Constraints and Revision Programming
We study active integrity constraints and revision programming, two formalisms designed to describe integrity constraints on databases and to specify policies on preferred ways to...
Luciano Caroprese, Miroslaw Truszczynski
GPCE
2007
Springer
13 years 11 months ago
Aspects of availability
In this paper, we propose a domain-specific aspect language to prevent the denials of service caused by resource management. Our aspects specify availability policies by enforcin...
Pascal Fradet, Stéphane Hong Tuan Ha
TSMC
2010
12 years 11 months ago
Extending the Adaptability of Reference Models
Reference models are an important aid for business process modeling and design. Their aim is to capture domain knowledge and assist in the design of enterprise specific business pr...
Iris Reinhartz-Berger, Pnina Soffer, Arnon Sturm
ECLIPSE
2005
ACM
13 years 6 months ago
Leveraging Eclipse for integrated model-based engineering of web service compositions
In this paper we detail the design and implementation of an Eclipse plug-in for an integrated, model-based approach, to the engineering of web service compositions. The plug-in al...
Howard Foster, Sebastián Uchitel, Jeff Mage...