Sciweavers

902 search results - page 126 / 181
» Security and Trust Requirements Engineering
Sort
View
SOCO
2007
Springer
15 years 3 months ago
Synthesizing Communication Middleware from Explicit Connectors in Component Based Distributed Architectures
In component based software engineering, an application is build by composing trusted and reusable units of execution, the components. A composition is formed by connecting the com...
Dietmar Schreiner, Karl M. Göschka
SEFM
2006
IEEE
15 years 3 months ago
A PVS Based Framework for Validating Compiler Optimizations
An optimization can be specified as sequential compositions of predefined transformation primitives. For each primitive, we can define soundness conditions which guarantee that th...
Aditya Kanade, Amitabha Sanyal, Uday P. Khedker
IUI
2003
ACM
15 years 3 months ago
A zero-input interface for leveraging group experience in web browsing
The experience of a trusted group of colleagues can help users improve the quality and focus of their browsing and searching activities. How could a system provide such help, when...
Taly Sharon, Henry Lieberman, Ted Selker
WETICE
1998
IEEE
15 years 2 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
EUROSYS
2007
ACM
15 years 6 months ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...