Sciweavers

861 search results - page 104 / 173
» Internal implementation
Sort
View
PROVSEC
2007
Springer
15 years 4 months ago
Formal Proof of Provable Security by Game-Playing in a Proof Assistant
Game-playing is an approach to write security proofs that are easy to verify. In this approach, security definitions and intractable problems are written as programs called games ...
Reynald Affeldt, Miki Tanaka, Nicolas Marti
SIGADA
2007
Springer
15 years 4 months ago
AADL modeling and analysis of hierarchical schedulers
A system based on a hierarchical scheduler is a system in which the processor is shared between several collaborative schedulers. Such schedulers exist since 1960 and they are bec...
Frank Singhoff, Alain Plantec
AGILEDC
2006
IEEE
15 years 3 months ago
Refactoring with Contracts
Design by contract is a practical methodology for developing code together with its specification. The contract consists of class invariants and method preand postconditions. As ...
Maayan Goldstein, Yishai A. Feldman, Shmuel S. Tys...
HICSS
2006
IEEE
113views Biometrics» more  HICSS 2006»
15 years 3 months ago
Examining Cross-Agency Collaborations in E-Government Initiatives
Cross-agency collaborations are critical to the success of e-government, which has great potential to transform the way that governments work, share information and deliver servic...
Paul Jen-Hwa Hu, Dai Cui, Alan Charles Sherwood
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
15 years 3 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke