Sciweavers

489 search results - page 36 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
MUC
1991
15 years 4 months ago
University of Massachusetts: description of the CIRCUS system as used for MUC-3
ind this work was to extract a relatively abstract level of information from each sentence , using only a limited vocabulary that was hand-crafted to handle a restricted set of tar...
Wendy G. Lehnert, Claire Cardie, David Fisher, Ell...
IAT
2010
IEEE
14 years 10 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
103
Voted
SEFM
2005
IEEE
15 years 6 months ago
Description Logics for Shape Analysis
Verification of programs requires reasoning about sets of program states. In case of programs manipulating pointers, program states are pointer graphs. Verification of such prog...
Lilia Georgieva, Patrick Maier
118
Voted
SIGSOFT
2008
ACM
16 years 1 months ago
Finding programming errors earlier by evaluating runtime monitors ahead-of-time
Runtime monitoring allows programmers to validate, for instance, the proper use of application interfaces. Given a property specification, a runtime monitor tracks appropriate run...
Eric Bodden, Patrick Lam, Laurie J. Hendren
SCAM
2008
IEEE
15 years 6 months ago
Modular Decompilation of Low-Level Code by Partial Evaluation
Decompiling low-level code to a high-level intermediate representation facilitates the development of analyzers, model checkers, etc. which reason about properties of the low-leve...
Miguel Gómez-Zamalloa, Elvira Albert, Germ&...