Sciweavers

390 search results - page 25 / 78
» Security Requirements Engineering for Evolving Software Syst...
Sort
View
94
Voted
ECOOPWEXCEPTION
2000
Springer
15 years 1 months ago
Action-Oriented Exception Handling in Cooperative and Competitive Concurrent Object-Oriented Systems
The chief aim of this survey is to discuss exception handling models which have been developed for concurrent object systems. In conducting this discussion we rely on the following...
Alexander B. Romanovsky, Jörg Kienzle
COMPSAC
2005
IEEE
15 years 3 months ago
Reasoning About Software Architecture-Based Regression Testing Through a Case Study
Two main issues need to be covered when dealing with the dependability of component-based systems: quality assurance of reusable software components and quality assurance of the a...
Henry Muccini, Marcio S. Dias, Debra J. Richardson
SIGSOFT
2003
ACM
15 years 10 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
APSEC
2006
IEEE
15 years 3 months ago
Secrobat: Secure and Robust Component-based Architectures
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to “patch”...
Artem Vorobiev, Jun Han
COMPSAC
2009
IEEE
15 years 1 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye