Sciweavers

361 search results - page 67 / 73
» A Case Study in Model-Based Adaptation of Web Services
Sort
View
RE
2010
Springer
13 years 1 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
WSC
2008
13 years 9 months ago
Simplification and aggregation strategies applied for factory analysis in conceptual phase using simulation
Despite that simulation possesses an establish background and offers tremendous promise for designing and analyzing complex production systems, manufacturing industry has been les...
Matias Urenda Moris, Amos Ng, Jacob Svensson
EDO
2005
Springer
14 years 7 days ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...
ACMACE
2008
ACM
13 years 8 months ago
Designing location-based mobile games with a purpose: collecting geospatial data with CityExplorer
The games with a purpose paradigm proposed by Luis von Ahn [9] is a new approach for game design where useful but boring tasks, like labeling a random image found in the web, are ...
Sebastian Matyas, Christian Matyas, Christoph Schl...
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
14 years 1 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...