Sciweavers

1587 search results - page 19 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
OOPSLA
2010
Springer
14 years 8 months ago
Almost free concurrency! (using GOF patterns)
We present a framework that provides concurrency-enhanced versions of the GOF object-oriented design patterns. The main benefit of our work is that if programmers improve program...
Sean L. Mooney, Hridesh Rajan, Steven M. Kautz, Wa...
GI
2001
Springer
15 years 2 months ago
Testing Distributed Component Based Systems Using UML/OCL
We present a pragmatic approach using formal methods to increase the quality of distributed component based systems: Based on UML class diagrams annotated with OCL constraints, co...
Achim D. Brucker, Burkhart Wolff
ACSAC
2004
IEEE
15 years 1 months ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
ITNG
2008
IEEE
15 years 4 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson
ECBS
2007
IEEE
144views Hardware» more  ECBS 2007»
15 years 4 months ago
DP-Miner: Design Pattern Discovery Using Matrix
Design patterns document expert design experience in software system development. They have been applied in many existing software systems. However, pattern information is general...
Jing Dong, Dushyant S. Lad, Yajing Zhao