Sciweavers

2209 search results - page 287 / 442
» Language Based Secure Communication
Sort
View
138
Voted
SIGSOFT
2005
ACM
16 years 4 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
ESOP
2009
Springer
15 years 10 months ago
All Secrets Great and Small
Tools for analysing secure information flow are almost exclusively based on ideas going back to Denning’s work from the 70’s. This approach embodies an imperfect notion of sec...
Delphine Demange, David Sands
115
Voted
ICOIN
2003
Springer
15 years 8 months ago
A Network Management Architecture Using XML-Based Policy Information Base
XML is being used to describe components and applications in a vendor and language neutral. Therefore it already has a role in distributed system. XML is also being used as a data ...
Kwoun Sup Youn, Choong Seon Hong
122
Voted
QSIC
2007
IEEE
15 years 9 months ago
Automatic Quality Assessment of SRS Text by Means of a Decision-Tree-Based Text Classifier
The success of a software project is largely dependent upon the quality of the Software Requirements Specification (SRS) document, which serves as a medium to communicate user req...
Ishrar Hussain, Olga Ormandjieva, Leila Kosseim
166
Voted
ISORC
1998
IEEE
15 years 7 months ago
An Approach to Distributed Component-Based Real-Time Application Software Development
Component-based software development would allow application software be largely constructed, rather than programmed. This approach would dramatically improve the productivity of ...
Stephen S. Yau, Bing Xia