Sciweavers

1855 search results - page 2 / 371
» System Consequence
Sort
View
SISW
2005
IEEE
13 years 10 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...
IWIA
2005
IEEE
13 years 10 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott
KR
1998
Springer
13 years 9 months ago
Comparing Consequence Relations
The technical problem addressed in this paper is, given two rule systems for consequence relations X and Y, how to construct Y-approximations of a given X-relation. While an upper...
Peter A. Flach
ICST
2008
IEEE
13 years 11 months ago
Testing Consequences of Grime Buildup in Object Oriented Design Patterns
Evidence suggests that as software ages the original realizations of design patterns remain in place, and participants in design pattern realizations accumulate “grime” – no...
Clemente Izurieta, James M. Bieman
SAFECOMP
2007
Springer
13 years 11 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...