Sciweavers

1620 search results - page 69 / 324
» Use Case Level Pointcuts
Sort
View
CCS
2006
ACM
15 years 7 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
HICSS
2010
IEEE
192views Biometrics» more  HICSS 2010»
15 years 3 months ago
Benefits of Enterprise Systems Use
Realizing business value and identifying the benefits arising from implementations of enterprise systems remains a significant challenge for both research and practice. A review o...
Susan P. Williams, Petra Schubert
JCS
1998
338views more  JCS 1998»
15 years 2 months ago
Intrusion Detection Using Sequences of System Calls
A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a g...
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaj...
ELPUB
2006
ACM
15 years 9 months ago
Electronic Publications of Old Geographical Maps and Studying Names on Them
Some aspects of digitizing old printed maps and suitable forms of storing are pointed to discussion. Questions arising about practical use of a resolution level, which is necessar...
Emil Kelevedjiev, Jordan Tabov, Desislava Dimkova
MFCS
2005
Springer
15 years 8 months ago
Regular Sets of Higher-Order Pushdown Stacks
Abstract. It is a well-known result that the set of reachable stack contents in a pushdown automaton is a regular set of words. We consider the more general case of higher-order pu...
Arnaud Carayol