Sciweavers

568 search results - page 28 / 114
» Enforcing traceability in software
Sort
View
106
Voted
CCS
2008
ACM
15 years 3 months ago
Efficient and extensible security enforcement using dynamic data flow analysis
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper, we solve both of these issues with an extensible system that is an order of magni...
Walter Chang, Brandon Streiff, Calvin Lin
IJFCS
2006
119views more  IJFCS 2006»
15 years 1 months ago
Enforcing Concurrent Temporal Behaviors
The outcome of verifying software is often a `counterexample', i.e., a listing of the actions and states of a behavior not satisfying the specification. In order to understan...
Doron Peled, Hongyang Qu
115
Voted
WER
2007
Springer
15 years 8 months ago
O Gerenciamento de Requisitos no Ambiente COCAR
Background. This research group has been working towards building an environment which helps software development, providing support to some activities mainly based on use case mo...
André Di Thommazo, Marcos Danilo Martins, S...
ASWEC
2010
IEEE
15 years 2 months ago
Scenario-Based Validation: Beyond the User Requirements Notation
—A quality-driven approach to software development and testing demands that, ultimately, the requirements of stakeholders be validated against the actual behavior of an implement...
Dave Arnold, Jean-Pierre Corriveau, Wei Shi
CCS
2009
ACM
16 years 2 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong