Sciweavers

851 search results - page 40 / 171
» Managing (Requirements) Evolutions of High Assurance Systems
Sort
View
EDOC
2006
IEEE
15 years 3 months ago
Secure Dissemination of XML Content Using Structure-based Routing
The paper proposes an approach to content dissemination that exploits the structural properties of XML Document Object Model in order to provide efficient dissemination by at the...
Ashish Kundu, Elisa Bertino
CCS
2008
ACM
14 years 11 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
ICDE
2003
IEEE
102views Database» more  ICDE 2003»
15 years 11 months ago
Schema Mediation in Peer Data Management Systems
Intuitively, data management and data integration tools should be well-suited for exchanging information in a semantically meaningful way. Unfortunately, they suffer from two sign...
Alon Y. Halevy, Zachary G. Ives, Dan Suciu, Igor T...
ICSE
2003
IEEE-ACM
15 years 10 months ago
A Component Architecture for an Extensible, Highly Integrated Context-Aware Computing Infrastructure
Ubiquitous context-aware computing systems present several challenges in their construction. Principal among them is the tradeoff between easily providing new contextaware service...
William G. Griswold, Robert T. Boyer, Steven W. Br...
DAGSTUHL
2003
14 years 11 months ago
Traceability and Evaluation in Scenario Analysis by Use Case Maps
The Use Case Map (UCM) scenario notation has some strong features related to rapid capture and evaluation of requirements models. In this paper, we explain how a UCM model was deve...
Dorin Bogdan Petriu, Daniel Amyot, C. Murray Woods...