Sciweavers

946 search results - page 59 / 190
» Software engineering for security: a roadmap
Sort
View
COMPSAC
2006
IEEE
15 years 3 months ago
Preventing Feature Interactions by Constraints
As software systems evolve by adding new extensions some unexpected conflicts may occur, which is known as the Feature Interaction Problem (FIP). FIP is a threat to the dependabil...
Jihong Zuo, Qianxiang Wang, Hong Mei
SPLC
2010
14 years 8 months ago
Stratified Analytic Hierarchy Process: Prioritization and Selection of Software Features
Product line engineering allows for the rapid development of variants of a domain specific application by using a common set of reusable assets often known as core assets. Variabil...
Ebrahim Bagheri, Mohsen Asadi, Dragan Gasevic, Sam...
CCS
2008
ACM
14 years 11 months ago
Mechanisms for usage control
Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce ...
Alexander Pretschner, Manuel Hilty, David A. Basin...
OOPSLA
2005
Springer
15 years 3 months ago
AutAT: an eclipse plugin for automatic acceptance testing of web applications
In this paper we describe AutAT, an open source Eclipse plugin to better enable test driven development of web applications. AutAT lets non-technical people write acceptance tests...
Christian Schwarz, Stein Kåre Skytteren, Tro...
SEFM
2007
IEEE
15 years 4 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi