Sciweavers

757 search results - page 92 / 152
» Composing Security-Aware Software
Sort
View
ICSE
2004
IEEE-ACM
16 years 3 months ago
Dependable Composite Web Services with Components Upgraded Online
Achieving high dependability of Web Services (WSs) dynamically composed from component WSs is an open problem. One of the main difficulties here is due to the fact that the compone...
Anatoliy Gorbenko, Vyacheslav S. Kharchenko, Peter...
ICSE
2007
IEEE-ACM
16 years 3 months ago
Parallel Randomized State-Space Search
Model checkers search the space of possible program behaviors to detect errors and to demonstrate their absence. Despite major advances in reduction and optimization techniques, s...
Matthew B. Dwyer, Sebastian G. Elbaum, Suzette Per...
ICSE
2007
IEEE-ACM
16 years 3 months ago
Modeling Product Line Architectures through Change Sets and Relationships
The essence of any modeling approach for product line architectures lies in its ability to express variability. Existing approaches do so by explicitly specifying variation points...
André van der Hoek, Scott A. Hendrickson
ESSOS
2010
Springer
15 years 10 months ago
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
Ben H. Smith, Laurie Williams, Andrew Austin
SAC
2009
ACM
15 years 10 months ago
Modular implementation of adaptive decisions in stochastic simulations
We present a modular approach to implement adaptive decisions with existing scientific codes. Using a sophisticated system software tool based on the function call interception t...
Pilsung Kang 0002, Yang Cao, Naren Ramakrishnan, C...