Sciweavers

5843 search results - page 150 / 1169
» Software Security in Practice
Sort
View
TC
2010
14 years 11 months ago
Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods
This paper proposes two improved interleaved modular multiplication algorithms based on Barrett and Montgomery modular reduction. The algorithms are simple and especially suitable ...
Miroslav Knezevic, Frederik Vercauteren, Ingrid Ve...
ICFEM
2007
Springer
15 years 10 months ago
Formal Engineering of XACML Access Control Policies in VDM++
We present a formal, tool-supported approach to the design and maintenance of access control policies expressed in the eXtensible Access Control Markup Language (XACML). Our aim is...
Jeremy Bryans, John S. Fitzgerald
FOSSACS
2011
Springer
14 years 8 months ago
A Practical Linear Time Algorithm for Trivial Automata Model Checking of Higher-Order Recursion Schemes
The model checking of higher-order recursion schemes has been actively studied and is now becoming a basis of higher-order program verification. We propose a new algorithm for tri...
Naoki Kobayashi
XPU
2009
Springer
15 years 11 months ago
Negotiating Contracts for Agile Projects: A Practical Perspective
The Agile Manifesto values “customer collaboration over contract negotiation”. However, in many real projects, Agile practitioners spend considerable time and effort negotiati...
Rashina Hoda, James Noble, Stuart Marshall
ICRE
1998
IEEE
15 years 8 months ago
Scenario Usage in System Development: A Report on Current Practice
: Scenario-based approaches are becoming ubiquitous in systems analysis and design but their definition and scope remain vague. Complementing the recently proposed CREWS classifica...
Klaus Weidenhaupt, Klaus Pohl, Matthias Jarke, Pet...