Sciweavers

946 search results - page 142 / 190
» Software engineering for security: a roadmap
Sort
View
CODES
2008
IEEE
15 years 4 months ago
Symbolic voter placement for dependability-aware system synthesis
This paper presents a system synthesis approach for dependable embedded systems. The proposed approach significantly extends previous work by automatically inserting fault detect...
Felix Reimann, Michael Glabeta, Martin Lukasiewycz...
ISPASS
2007
IEEE
15 years 4 months ago
An Analysis of Performance Interference Effects in Virtual Environments
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization ...
Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic ...
OOPSLA
2007
Springer
15 years 3 months ago
Activating refactorings faster
s Refactoring tools promise to increase the speed at which programmers write code, but programmers report that contemporary tools sometimes slow them down. Some of that slowdown ca...
Emerson R. Murphy-Hill
WER
2007
Springer
15 years 3 months ago
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Faranak Farzad, Eric Yu, Patrick C. K. Hung
OOPSLA
2005
Springer
15 years 3 months ago
PolyD: a flexible dispatching framework
The standard dispatching mechanisms built into programming languages are sometimes inadequate to the needs of the programmer. In the case of Java, the need for more flexibility h...
Antonio Cunei, Jan Vitek