Sciweavers

1529 search results - page 267 / 306
» A Taxonomy of Software Component Models
Sort
View
SIGSOFT
1998
ACM
15 years 8 months ago
Reasoning about Implicit Invocation
Implicit invocation SN92, GN91] has become an important architectural style for large-scale system design and evolution. This paper addresses the lack of speci cation and veri cat...
David Garlan, Somesh Jha, David Notkin
ARCS
2004
Springer
15 years 7 months ago
A Note on Certificate Path Verification in Next Generation Mobile Communications
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
130
Voted
JSS
1998
139views more  JSS 1998»
15 years 3 months ago
Human-computer interaction: Interdisciplinary roots and trends
Methodology, theory, and practice in the ®eld of Human±Computer Interaction (HCI) all share the goal of producing interactive software that can be used eciently, e€ectively, ...
H. Rex Hartson
142
Voted
CCS
2007
ACM
15 years 10 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
EWSA
2004
Springer
15 years 9 months ago
An Architecture Description Language for Mobile Distributed Systems
Mobile software applications have to meet new requirements directly arising from mobility issues. To address these requirements at an early stage in development, an architecture d...
Volker Gruhn, Clemens Schäfer