Sciweavers

544 search results - page 51 / 109
» Management of Composites in Software Engineering Environment...
Sort
View
CISIS
2010
IEEE
15 years 6 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
WWW
2006
ACM
16 years 15 days ago
Capturing the essentials of federated systems
Today, the Web is increasingly used as a platform for distributed services, which transcend organizational boundaries to form federated applications. Consequently, there is a grow...
Alexander Brändle, Frederic Majer, Johannes M...
AVI
1994
15 years 1 months ago
Recognizing and Interpreting Diagrams in Design
Hand drawn diagrams are essential tools for thinking and communicating in the early phases of design, yet computer based drawing tools support diagramming and sketching only poorl...
Mark D. Gross
KBSE
2007
IEEE
15 years 6 months ago
Iterative model-driven development of adaptable service-based applications
Flexibility and interoperability make web services well suited for designing highly-customizable reactive service-based applications, that is interactive applications that can be ...
Leen Lambers, Hartmut Ehrig, Leonardo Mariani, Mau...
ICSEA
2007
IEEE
15 years 6 months ago
Making Cost Effective Security Decision with Real Option Thinking
One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
Jingyue Li, Xiaomeng Su