Sciweavers

597 search results - page 83 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
EDOC
2002
IEEE
14 years 17 days ago
Workflow-Based Composition of Web-Services: A Business Model or a Programming Paradigm?
While SOAP/XML is perceived as the appropriate interoperability level for web-services, companies compete to provide workflow-based tools for web-service integration. This paper p...
Dinesh Ganesarajah, Emil Lupu
SIGOPSE
1998
ACM
13 years 12 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
OOPSLA
2001
Springer
14 years 1 days ago
Jiazzi: New-Age Components for Old-Fashioned Java
We present Jiazzi, a system that enables the construction of largescale binary components in Java. Jiazzi components can be thought of as generalizations of Java packages with add...
Sean McDirmid, Matthew Flatt, Wilson C. Hsieh
SIGCOMM
2009
ACM
14 years 2 months ago
PathForge: faithful anonymization of movement data
For most mobile networks, providers need the current position of their users to provide efficient service. The resulting motion data is not only an invaluable source for analyzing...
Sebastian Kay Belle, Marcel Waldvogel, Oliver Haas...
CCS
2009
ACM
13 years 11 months ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...