Sciweavers

2236 search results - page 260 / 448
» Secure Software Design in Practice
Sort
View
IEEESP
2010
126views more  IEEESP 2010»
15 years 1 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
WPES
2003
ACM
15 years 8 months ago
Privacy preserving database application testing
Traditionally, application software developers carry out their tests on their own local development databases. However, such local databases usually have only a small number of sa...
Xintao Wu, Yongge Wang, Yuliang Zheng
CORR
2004
Springer
113views Education» more  CORR 2004»
15 years 3 months ago
Pattern Reification as the Basis for Description-Driven Systems
One of the main factors driving object-oriented software development for information systems is the requirement for systems to be tolerant to change. To address this issue in desig...
Florida Estrella, Zsolt Kovacs, Jean-Marie Le Goff...
SIGSOFT
2007
ACM
16 years 3 months ago
A study of interleaving coverage criteria
Concurrency bugs are becoming increasingly important due to the prevalence of concurrent programs. A fundamental problem of concurrent program bug detection and testing is that th...
Shan Lu, Weihang Jiang, Yuanyuan Zhou
WWW
2005
ACM
16 years 3 months ago
Mapping XML instances
For XML-based applications in general and B2B applications in particular, mapping between differently structured XML documents, to enable exchange of data, is a basic problem. A g...
Sai Anand, Erik Wilde