Sciweavers

3771 search results - page 470 / 755
» Subobject Transformation Systems
Sort
View
IEEEARES
2009
IEEE
15 years 11 months ago
Identifying and Resolving Least Privilege Violations in Software Architectures
The implementation of security principles, like least privilege, in a software architecture is difficult, as no systematic rules on how to apply them in practice exist. As a resu...
Koen Buyens, Bart De Win, Wouter Joosen
CSIE
2009
IEEE
15 years 11 months ago
A Metamodel for Tracing Non-functional Requirements
The tendency for Non-Functional Requirements (NFRs) to have a wide-ranging impact on a software system, and the strong interdependencies and tradeoffs that exist between NFRs and ...
Mohamad Kassab, Olga Ormandjieva, Maya Daneva
HOST
2009
IEEE
15 years 11 months ago
Secure IP-Block Distribution for Hardware Devices
—EDA vendors have proposed a standard for the sharing of IP among vendors to be used in the design and development of IP for FPGAs. Although, we do not propose any attacks, we sh...
Jorge Guajardo, Tim Güneysu, Sandeep S. Kumar...
SAINT
2009
IEEE
15 years 11 months ago
CCDM: Central Controller-Based Device Management Architecture and Method to Split Management Scripts
This paper presents CCDM, a new architecture for management of devices, which collect environmental information and give effects to the environment. CCDM provides easy management ...
Akihiro Sugiyama, Hideya Ochiai, Hiroshi Esaki
ADBIS
2009
Springer
151views Database» more  ADBIS 2009»
15 years 11 months ago
Rule-Based Management of Schema Changes at ETL Sources
In this paper, we visit the problem of the management of inconsistencies emerging on ETL processes as results of evolution operations g at their sources. We abstract Extract-Transf...
George Papastefanatos, Panos Vassiliadis, Alkis Si...