Sciweavers

757 search results - page 16 / 152
» Composing Security-Aware Software
Sort
View
ICSE
1993
IEEE-ACM
15 years 2 months ago
Procedure Calls Are the Assembly Language of Software Interconnection: Connectors Deserve First-Class Status
Software designers compose systems from components written in some prolanguage. They regularly describe systems using abstract patterns and sophisticated relations among component...
Mary Shaw
SIGMOD
2011
ACM
249views Database» more  SIGMOD 2011»
14 years 24 days ago
FlexMin: a flexible tool for automatic bug isolation in DBMS software
Debugging a database engine is an arduous task due to the complexity of the query workloads and systems. The first step in isolating a bug involves identifying a sequence of step...
Kristi Morton, Nicolas Bruno
ICSE
2011
IEEE-ACM
14 years 1 months ago
Pragmatic reuse in web application development
Highly interactive web applications that offer user experience and responsiveness of desktop applications are becoming increasingly popular. They are often composed out of visual...
Josip Maras
ASE
2011
14 years 5 months ago
Compositional model checking of software product lines using variation point obligations
This paper introduces a technique for incremental and compositional model checking that allows efficient reuse of model-checking results associated with the features in a product l...
Jing Liu, Samik Basu, Robyn R. Lutz
COMPSAC
2003
IEEE
15 years 3 months ago
A Security Characterisation Framework for Trustworthy Component Based Software Systems
This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framewo...
Khaled M. Khan, Jun Han