Sciweavers

537 search results - page 14 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 9 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
TAPSOFT
1997
Springer
13 years 11 months ago
A Type-Based Approach to Program Security
This paper presents a type system which guarantees that well-typed programs in a procedural programming language satisfy a noninterference security property. With all program input...
Dennis M. Volpano, Geoffrey Smith
COMPSAC
2007
IEEE
13 years 7 months ago
A Connector-Centric Approach to Aspect-Oriented Software Evolution
Lose sight of the existence of system crosscutting concerns, e.g. safety and quality etc, often causes the system hard to maintain and evolve according to the changing environment...
Yiming Lau, Wenyun Zhao, Xin Peng, Shan Tang
FASE
2001
Springer
14 years 41 min ago
A Hoare Calculus for Verifying Java Realizations of OCL-Constrained Design Models
Abstract. The Object Constraint Language OCL offers a formal notation for constraining the modelling elements occurring in UML diagrams. In this paper we apply OCL for developing ...
Bernhard Reus, Martin Wirsing, Rolf Hennicker
ESSOS
2010
Springer
14 years 4 months ago
Model-Driven Security Policy Deployment: Property Oriented Approach
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...