Sciweavers

7103 search results - page 285 / 1421
» Program Generation and Components
Sort
View
162
Voted
CSCW
2012
ACM
13 years 11 months ago
CoRED: browser-based Collaborative Real-time Editor for Java web applications
While the users of completed applications are heavily moving from desktop to the web browser, the majority of developers are still working with desktop IDEs such as Eclipse or Vis...
Janne Lautamäki, Antti Nieminen, Johannes Kos...
107
Voted
IEEEIAS
2007
IEEE
15 years 9 months ago
Team Edit Automata for Testing Security Property
This paper introduces a mathematical model, called Team Edit Automata, for evaluating software security properties. We use the model to describe security properties and their corr...
Zhenrong Yang, Aiman Hanna, Mourad Debbabi
ENTCS
2010
130views more  ENTCS 2010»
15 years 3 months ago
Compositional System Security with Interface-Confined Adversaries
This paper presents a formal framework for compositional reasoning about secure systems. A key insight is to view a trusted system in terms of the interfaces that the various comp...
Deepak Garg, Jason Franklin, Dilsun Kirli Kaynar, ...
118
Voted
IFIP
2010
Springer
14 years 10 months ago
Modular Plans for Secure Service Composition
Service Oriented Computing (SOC) is a programming paradigm aiming at characterising Service Networks. Services are entities waiting for clients requests and they often result from ...
Gabriele Costa, Pierpaolo Degano, Fabio Martinelli
ICSE
2007
IEEE-ACM
16 years 3 months ago
Compatibility and Regression Testing of COTS-Component-Based Software
Software engineers frequently update COTS components integrated in component-based systems, and can often chose among many candidates produced by different vendors. This paper tac...
Leonardo Mariani, Mauro Pezzè, Sofia Papagi...