Sciweavers

2213 search results - page 339 / 443
» Software Security
Sort
View
112
Voted
FOSSACS
2005
Springer
15 years 9 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
122
Voted
OOPSLA
2005
Springer
15 years 9 months ago
CodeQuest: querying source code with datalog
We describe CodeQuest, a system for querying source code. It combines two previous proposals, namely the use of logic programming and database system. Experiments (on projects ran...
Elnar Hajiyev, Mathieu Verbaere, Oege de Moor, Kri...
OOPSLA
2005
Springer
15 years 9 months ago
Inferring context-free grammars for domain-specific languages
Grammatical inference (or grammar inference) has been applied to various problems in areas such as computational biology, and speech and pattern recognition but its application to...
Faizan Javed
146
Voted
ARCS
2004
Springer
15 years 8 months ago
Finite-State Modeling, Analysis and Testing of System Vulnerabilities
: Man-machine systems have several desirable properties, as to user friendliness, reliability, safety, security or other global system attributes. The potential for the lack, or br...
Fevzi Belli, Christof J. Budnik, Nimal Nissanke
OOPSLA
2004
Springer
15 years 8 months ago
Deriving refactorings for aspectJ
In this paper we present aspect-oriented programming laws that are useful for deriving refactorings for AspectJ. The laws help developers to verify if the transformations they de...
Leonardo Cole, Paulo Borba