— The three traditional objectives of computer security are confidentiality, integrity and availability [8]. Availability can be defined as the prevention of denial of service. C...
The integration of constraint solvers into proof planning has pushed the problem solving horizon. Proof planning benefits from the general functionalities of a constraint solver s...
Viewpoints are re ections of software systems from multiple perspectives. A number of consistency conditions apply to viewpoints and developers require a tool for each type of vie...
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
Using models in different contexts poses major integration challenges, ranging from technical to conceptual levels. Independently of each other developed model components cannot b...