Sciweavers

288 search results - page 48 / 58
» Formal Analysis of Workflow Systems with Security Considerat...
Sort
View
ECBS
2005
IEEE
160views Hardware» more  ECBS 2005»
15 years 3 months ago
Traceability-Driven Model Refinement for Test Case Generation
Testing complex Computer-Based Systems is not only a demanding but a very critical task. Therefore the use of models for generating test data is an important goal. Tool support du...
Matthias Riebisch, Michael Hübner
COMPSAC
2009
IEEE
15 years 2 months ago
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...
Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed, Moham...
CCS
2007
ACM
15 years 3 months ago
A calculus of challenges and responses
er presents a novel approach for concisely abstracting authentication s and for subsequently analyzing those abstractions in a sound manner, i.e., deriving authentication guarante...
Michael Backes, Agostino Cortesi, Riccardo Focardi...
PLDI
2006
ACM
15 years 3 months ago
SAFECode: enforcing alias analysis for weakly typed languages
Static analysis of programs in weakly typed languages such as C and C++ is generally not sound because of possible memory errors due to dangling pointer references, uninitialized ...
Dinakar Dhurjati, Sumant Kowshik, Vikram S. Adve
WIDM
2005
ACM
15 years 3 months ago
Exploiting native XML indexing techniques for XML retrieval in relational database systems
In XML retrieval, two distinct approaches have been established and pursued without much cross-fertilization taking place so far. On the one hand, native XML databases tailored to...
Felix Weigel, Klaus U. Schulz, Holger Meuss