Sciweavers

1288 search results - page 71 / 258
» On Analysis of Design Component Contracts: A Case Study
Sort
View
RE
2006
Springer
14 years 11 months ago
Using trust assumptions with security requirements
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
IPPS
2009
IEEE
15 years 6 months ago
EmBOINC: An emulator for performance analysis of BOINC projects
BOINC is a platform for volunteer computing. The server component of BOINC embodies a number of scheduling policies and parameters that have a large impact on the projects through...
Trilce Estrada, Michela Taufer, Kevin Reed, David ...
IWPSE
2005
IEEE
15 years 5 months ago
Supporting Web Application Evolution by Dynamic Analysis
The evolution of Web Applications needs to be supported by the availability of proper analysis and design documents. UML use case diagrams are certainly useful to identify feature...
Giuseppe A. Di Lucca, Massimiliano Di Penta, Anna ...
WWW
2004
ACM
16 years 16 days ago
Ontological representation of learning objects: building interoperable vocabulary and structures
The ontological representation of learning objects is a way to deal with the interoperability and reusability of learning objects (including metadata) through providing a semantic...
Jian Qin, Naybell Hernández
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 1 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...