Sciweavers

37 search results - page 8 / 8
» Generating Counterexamples for Multi-valued Model-Checking
Sort
View
SIGSOFT
2005
ACM
16 years 2 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
CCGRID
2006
IEEE
15 years 7 months ago
Component-Based Modeling, Analysis and Animation
Component-based software construction is widely used in a variety of applications, from embedded environments to grid computing. However, errors in these applications and systems ...
Jeff Kramer