Sciweavers

488 search results - page 36 / 98
» ST-Tool: A CASE Tool for Security Requirements Engineering
Sort
View
ASPLOS
2012
ACM
13 years 7 months ago
A case for unlimited watchpoints
Numerous tools have been proposed to help developers fix software errors and inefficiencies. Widely-used techniques such as memory checking suffer from overheads that limit thei...
Joseph L. Greathouse, Hongyi Xin, Yixin Luo, Todd ...
ICSE
2007
IEEE-ACM
15 years 12 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
ICSE
2004
IEEE-ACM
15 years 12 months ago
A Tool for Writing and Debugging Algebraic Specifications
Despite their benefits, programmers rarely use formal specifications, because they are difficult to write and they require an up front investment in time. To address these issues,...
Johannes Henkel, Amer Diwan
ASWEC
2006
IEEE
15 years 5 months ago
Evaluating software refactoring tool support
Up to 75% of the costs associated with the development of software systems occur post-deployment during maintenance and evolution. Software refactoring is a process which can sign...
Erica Mealy, Paul A. Strooper
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
16 years 11 days ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....