Sciweavers

7380 search results - page 1145 / 1476
» Engineering Software Intensive Systems
Sort
View
COMPSAC
2007
IEEE
15 years 8 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
EUROSYS
2007
ACM
15 years 8 months ago
Adding dynamic reconfiguration support to JBoss AOP
The majority of aspect-oriented middlewares supporting dynamic aspect weaving fail to preserve important safety properties while weaving or unweaving a distributed aspect at runti...
Nico Janssens, Eddy Truyen, Frans Sanen, Wouter Jo...
FSEN
2009
Springer
15 years 8 months ago
Executable Interface Specifications for Testing Asynchronous Creol Components
We propose and explore a formal approach for black-box testing asynchronously communicating components in open environments. Asynchronicity poses a challenge for validating and tes...
Immo Grabe, Marcel Kyas, Martin Steffen, Arild B. ...
ICAIL
2007
ACM
15 years 8 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
APSEC
2004
IEEE
15 years 8 months ago
An Integrated Model of ISO 9001: 2000 and CMMI for ISO Registered Organizations
ISO 9001 is a standard for quality management systems while CMMI is a model for process improvement. If an organization that has achieved ISO registration wishes to improve proces...
Chanwoo Yoo, Junho Yoon, Byungjeong Lee, Chong-Won...
« Prev « First page 1145 / 1476 Last » Next »