Sciweavers

2429 search results - page 265 / 486
» Using Aspects to Design a Secure System
Sort
View
SOUPS
2009
ACM
15 years 9 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
165
Voted
CL
2007
Springer
15 years 3 months ago
A bulk-synchronous parallel process algebra
The CCS (Calculus of Communicating Systems) process algebra is a well-known formal model of synchronization and communication. It is used for the analysis of safety and liveness i...
Armelle Merlin, Gaétan Hains
ICSE
2009
IEEE-ACM
15 years 10 months ago
Multi-dimensional service compositions
The wide diffusion of reliable Internet is pushing two key novelties in the conception of modern software applications: the Software as a Service paradigm and the idea of the Inte...
Luciano Baresi, Elisabetta Di Nitto, Sam Guinea, S...
ITCC
2003
IEEE
15 years 8 months ago
RDF/XML-based Automatic Generation of Adaptable Hypermedia Presentations
As web information systems tend to mature it has become increasingly important to have an engineered design of such systems. Hera is a design methodology that supports the develop...
Flavius Frasincar, Geert-Jan Houben, Peter Barna, ...
APCSAC
2001
IEEE
15 years 7 months ago
Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond
Since we first devised and defined password-capabilities as a new technique for building capability-based operating systems, a number of research systems around the world have use...
Ronald Pose