Sciweavers

591 search results - page 18 / 119
» Embracing policy engineering
Sort
View
74
Voted
ICSE
2007
IEEE-ACM
15 years 9 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
COMPSAC
2008
IEEE
15 years 4 months ago
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming
The lifecycle mismatch between vehicles and their IT system poses a problem for the automotive industry. Such systems need to be open and extensible to provide customised function...
Phu H. Phung, David Sands
IEEESCC
2007
IEEE
15 years 4 months ago
Governance of Cross-Organizational Service Agreements: A Policy-Based Approach
Many real-life organizations are hierarchies of largely autonomous, heterogeneous members (individuals or other organizations), often exhibiting rich policies. We restrict our att...
Yathiraj B. Udupi, Munindar P. Singh
SEFM
2005
IEEE
15 years 3 months ago
Precise Analysis of Memory Consumption using Program Logics
Memory consumption policies provide a means to control resource usage on constrained devices, and play an important role in ensuring the overall quality of software systems, and i...
Gilles Barthe, Mariela Pavlova, Gerardo Schneider
XPU
2005
Springer
15 years 3 months ago
XP South of the Equator: An eXPerience Implementing XP in Brazil
Many have reported successful experiences using XP, but we have not yet seen many experiences adapting agile methodologies in developing countries such as Brazil. In a developing e...
Alexandre Freire da Silva, Fabio Kon, Cicero Torte...