Sciweavers

1499 search results - page 14 / 300
» Case Study: An Implementation of a Secure Steganographic Sys...
Sort
View
IEEEARES
2009
IEEE
15 years 4 months ago
Identifying and Resolving Least Privilege Violations in Software Architectures
The implementation of security principles, like least privilege, in a software architecture is difficult, as no systematic rules on how to apply them in practice exist. As a resu...
Koen Buyens, Bart De Win, Wouter Joosen
85
Voted
LPAR
2000
Springer
15 years 1 months ago
Encoding Temporal Logics in Executable Z: A Case Study for the ZETA System
Abstract. The ZETA system is a Z-based tool environment for developing formal specifications. It contains a component for executing the Z language based on the implementation techn...
Wolfgang Grieskamp, Markus Lepper
IADIS
2009
14 years 7 months ago
Relational databases versus information retrieval systems: A case study
In this paper we present our evaluations of using an Information Retrieval library in a commercial employment website with over 300,000 searches a day. Comparison of existing rela...
Ozgur Yilmazel, Burcu Yurekli, Baris Yilmazel, Ahm...
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
15 years 4 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
TSE
2011
214views more  TSE 2011»
14 years 4 months ago
A Comparative Study of Software Model Checkers as Unit Testing Tools: An Industrial Case Study
—Conventional testing methods often fail to detect hidden flaws in complex embedded software such as device drivers or file systems. This deficiency incurs significant developmen...
Moonzoo Kim, Yunho Kim, Hotae Kim