Sciweavers

36 search results - page 7 / 8
» A Framework for Analyzing Composition of Security Aspects
Sort
View
OOPSLA
2007
Springer
14 years 1 months ago
Combining structural subtyping and external dispatch
Nominal subtyping (or user-defined subtyping) and structural subtyping each have their own strengths and weaknesses. Nominal subtyping allows programmers to explicitly express de...
Donna Malayeri
AISS
2010
131views more  AISS 2010»
13 years 5 months ago
LWSDM: Layered Web Service Discovery Mechanism
The boom of Service oriented architecture is on substantial rise. SOA developers orchestrate individual SOA objects into web services. It has been a dream of software engineers to...
Shrabani Mallick, D. S. Kushwaha
IRI
2006
IEEE
14 years 1 months ago
Toward component non-functional interoperability analysis: A UML-based and goal-oriented approach
Component interoperability is the ability of two or more components to cooperate despite their differences in functional and non-functional aspects such as security or performanc...
Sam Supakkul, Ebenezer A. Oladimeji, Lawrence Chun...
NSPW
2006
ACM
14 years 1 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
DS
1997
104views Database» more  DS 1997»
13 years 9 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi