Sciweavers

2513 search results - page 135 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
CSSE
2004
IEEE
14 years 9 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
ICAIL
2007
ACM
15 years 1 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
SIMULATION
2011
14 years 5 months ago
The Activity-tracking paradigm in discrete-event modeling and simulation: The case of spatially continuous distributed systems
From a modelling and simulation perspective, studying dynamic systems consists of focusing on changes in states. According to the precision of state changes, generic algorithms ca...
Alexandre Muzy, Rajanikanth Jammalamadaka, Bernard...
ISORC
1999
IEEE
15 years 2 months ago
Exception Handling in a Cooperative Object-Oriented Approach
ation Oriented Action (CO action) is a modelling abstraction for representing collaborative behaviour between objects at different phases of the software development. In this pape...
Rogério de Lemos, Alexander B. Romanovsky
APSEC
2004
IEEE
15 years 1 months ago
An Approach to Detecting Domain Errors Using Formal Specification-Based Testing
Domain testing, a technique for testing software or portions of software dominated by numerical processing, is intended to detect domain errors that usually arise from incorrect i...
Yuting Chen, Shaoying Liu