Sciweavers

3828 search results - page 642 / 766
» Proof-Based System Engineering Using a Virtual System Model
Sort
View
WETICE
1998
IEEE
15 years 6 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
134
Voted
AVI
2008
15 years 4 months ago
An empirical evaluation of interactive visualizations for preferential choice
Many critical decisions for individuals and organizations are often framed as preferential choices: the process of selecting the best option out of a set of alternatives. This pap...
Jeanette Bautista, Giuseppe Carenini
149
Voted
SEKE
2010
Springer
15 years 28 days ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
ICSE
2004
IEEE-ACM
16 years 2 months ago
Theme: An Approach for Aspect-Oriented Analysis and Design
Aspects are behaviours that are tangled and scattered across a system. In requirements documentation, aspects manifest themselves as descriptions of behaviours that are intertwine...
Elisa L. A. Baniassad, Siobhán Clarke
139
Voted
ICSE
2009
IEEE-ACM
15 years 9 months ago
Automated testing of healthcare document transformations in the PICASSO interoperability platform
In every application domain, achieving interoperability among heterogenous information systems is a crucial challenge and alliances are formed to standardize data-exchange formats...
Massimo Pascale, Marcello Roselli, Umberto Rugani,...