Sciweavers

537 search results - page 63 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
FIW
2009
134views Communications» more  FIW 2009»
13 years 5 months ago
Feature Diagrams for Change-Oriented Programming
Abstract. The idea of feature-oriented programming is to map requirements to features, concepts that can be composed to form a software product. Change-oriented programming (ChOP),...
Peter Ebraert, Andreas Classen, Patrick Heymans, T...
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ISSE
2010
13 years 6 months ago
A second look at Faster, Better, Cheaper
“Faster, Better, Cheaper” (FBC) was a systems development methodology used by NASA in the 1990s. While usually a deprecated practice, we find that, with certain caveats, it is...
Oussama El-Rawas, Tim Menzies
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
14 years 2 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
CBSE
2009
Springer
14 years 2 months ago
Selecting Fault Tolerant Styles for Third-Party Components with Model Checking Support
To build highly available or reliable applications out of unreliable third-party components, some software-implemented fault-tolerant mechanisms are introduced to gracefully deal w...
Junguo Li, Xiangping Chen, Gang Huang, Hong Mei, F...