Sciweavers

2118 search results - page 115 / 424
» Execution of A Requirement Model in Software Development
Sort
View
WETICE
2005
IEEE
15 years 10 months ago
Application of Lightweight Formal Methods to Software Security
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...
David P. Gilliam, John D. Powell, Matt Bishop
HPCA
2011
IEEE
14 years 8 months ago
Dynamic parallelization of JavaScript applications using an ultra-lightweight speculation mechanism
As the web becomes the platform of choice for execution of more complex applications, a growing portion of computation is handed off by developers to the client side to reduce net...
Mojtaba Mehrara, Po-Chun Hsu, Mehrzad Samadi, Scot...
ISPW
2008
IEEE
15 years 11 months ago
Scoping Software Process Models - Initial Concepts and Experience from Defining Space Standards
Defining process standards by integrating, harmonizing, and standardizing heterogeneous and often implicit processes is an important task, especially for large development organiza...
Ove Armbrust, Masafumi Katahira, Yuko Miyamoto, J&...
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
15 years 10 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
SOCO
2008
Springer
15 years 4 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot