Sciweavers

IASTEDSE
2004
13 years 6 months ago
Conflict checking of separation of duty constraints in RBAC - implementation experiences
Separation of duty constraints define mutual exclusion relations between two entities (e.g. two permissions). Thus, a software component that supports the definition of separation...
Mark Strembeck
IASTEDSE
2004
13 years 6 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
IASTEDSE
2004
13 years 6 months ago
Service specification with MSCs and roles
The notion of service enjoys increasing popularity as a means for structuring complex distributed systems. Most definitions of the term service, however, refer only to syntactic l...
Ingolf H. Krüger
IASTEDSE
2004
13 years 6 months ago
Flexible incremental development by integrating specification and code
This paper describes the use of executable specifications to ease incremental development, by providing more flexibility regarding the order in which modules are implemented. In t...
Patrick Schmid, Christine Hofmeister
IASTEDSE
2004
13 years 6 months ago
Does active guidance improve software inspections? A preliminary empirical study
Inspections are an established quality assurance technique. In order to optimize the inspection approach, different reading techniques, such as checklist-based reading and scenari...
Christian Denger, Marcus Ciolkowski, Filippo Lanub...
IASTEDSE
2004
13 years 6 months ago
Using application domain ontology to construct an initial system model
This paper describes a case study on application of natural language processing in very early stages of the requirements engineering. In our previous work [7] we have shown how na...
Leonid Kof
IASTEDSE
2004
13 years 6 months ago
Providing multidimensional decomposition in object-oriented analysis and design
In this paper we argue that the explicit capture of crosscutting concerns in code should be the natural consequence of good and clean modularity in analysis and design, based on f...
Constantinos Constantinides, Therapon Skotiniotis
IASTEDSE
2004
13 years 6 months ago
A pro-active middleware platform for mobile environments
With wireless communications and mobile hand-held devices becoming a reality, new applications where users can have access to information anytime, anywhere are made possible. To d...
Denis Conan, Chantal Taconet, Dhouha Ayed, Lydiall...
IASTEDSE
2004
13 years 6 months ago
Visual interface for adaptation of data sources to semantic web
Development of computer communications has catalyzed integration processes in world communities. Initial efforts concerning integration have showed great heterogeneity between dat...
Olena Kaykova, Oleksiy Khriyenko, Mikko Kovalainen...
IASTEDSE
2004
13 years 6 months ago
Security and reliability challenges in component-based software for consumer devices
Consumer devices have domain specific constraints imposed by end-users, device manufacturers and service providers. These constraints focus on the need for security and reliabilit...
Stefano Campadello, Ronan MacLaverty, Titos Sarida...