Sciweavers

2056 search results - page 250 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
147
Voted
COMPSAC
2002
IEEE
15 years 10 months ago
From MSC and UML to SDL
UML and MSC are widely used by software practitioners. SDL is an ITU standard language for telecommunications software specification. It has a formal semantics, and is supported b...
Stephan Bourduas, Ferhat Khendek, Daniel Vincent
ICSE
2009
IEEE-ACM
16 years 5 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
ISSTA
2006
ACM
15 years 11 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
165
Voted
SAC
2008
ACM
15 years 4 months ago
Autonomic management policy specification in Tune
Distributedsoftwareenvironmentsareincreasinglycomplex anddiculttomanage,astheyintegratevariouslegacysoftware with specic management interfaces. Moreover, the factthatmanagementtas...
Laurent Broto, Daniel Hagimont, Patricia Stolf, No...
ICSE
2003
IEEE-ACM
16 years 5 months ago
Model-based Simulation of Web Applications for Usability Assessment
In this paper we discuss an approach for simulating the behaviour of interactive software systems, before starting on any of the actual implementation, based on a model of the sys...
Robert Chatley, Jeff Kramer, Jeff Magee, Sebasti&a...