Sciweavers

3316 search results - page 265 / 664
» Mining Software Engineering Data
Sort
View
COMPSAC
2009
IEEE
15 years 10 months ago
SN2K Attacks and Honest Services
—In this paper, we define and illustrate a new form of attack in the context of software services: the software-based need-to-know (SN2K) attack. SN2K attacks can be carried out...
Ashish Kundu
COMPSAC
2009
IEEE
15 years 10 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
116
Voted
KBSE
2008
IEEE
15 years 10 months ago
Composition of Qualitative Adaptation Policies
In a highly dynamic environment, software systems requires a capacity of self-adaptation to fit the environment and the user needs evolution, which increases the software archite...
Franck Chauvel, Olivier Barais, Isabelle Borne, Je...
133
Voted
SCAM
2005
IEEE
15 years 9 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich
117
Voted
ISSTA
1989
ACM
15 years 7 months ago
Estimating the Number of Test Cases Required to Satisfy the All-du-paths Testing Criterion
The all-du-paths software testing criterion is the most discriminating of the data ow testing criteria of Rapps and Weyuker. Unfortunately, in the worst case, the criterion requir...
James M. Bieman, J. Schultz