Sciweavers

2236 search results - page 273 / 448
» Secure Software Design in Practice
Sort
View
PERCOM
2006
ACM
15 years 9 months ago
A Campus-Wide Mobile EMS Information Management System
—Efficient information management is crucial for the timely administration of Emergency Medical Services (EMS). In this paper, we describe a project to design and implement an au...
Brian R. L'Heureux, Michael J. McHugh, Benjamin D....
CCS
2011
ACM
14 years 3 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
ICSE
2005
IEEE-ACM
16 years 3 months ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu
OOPSLA
2007
Springer
15 years 9 months ago
Synthesizing reactive systems from LSC requirements using the play-engine
Live Sequence Charts (LSCs) is a scenario-based language for modeling object-based reactive systems with liveness properties. A tool called the Play-Engine allows users to create ...
Hillel Kugler, Cory Plock, Amir Pnueli
MOBISYS
2008
ACM
16 years 2 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...