Sciweavers

288 search results - page 37 / 58
» Algebra and logic for access control
Sort
View
EUROMICRO
2004
IEEE
13 years 11 months ago
The Need for Declarative Security Mechanisms
Today, security is recognized as an absolute need in application development. Programming environments offer mechanisms and concepts allowing an easy integration of security mecha...
Stefan Probst, Josef Küng
ENTCS
2007
199views more  ENTCS 2007»
13 years 7 months ago
Heuristics for Safety and Security Constraints
The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-fr...
Flemming Nielson, Hanne Riis Nielson
VISSOFT
2005
IEEE
14 years 1 months ago
Multi-level Method Understanding Using Microprints
Understanding classes and methods is a key activity in object-oriented programming, since classes represent the abstractions from which applications are built, while methods conta...
Stéphane Ducasse, Michele Lanza, Romain Rob...
DATE
2006
IEEE
101views Hardware» more  DATE 2006»
14 years 1 months ago
A parallel configuration model for reducing the run-time reconfiguration overhead
Multitasking on reconfigurable logic can achieve very high silicon reusability. However, configuration latency is a major limitation and it can largely degrade the system performa...
Yang Qu, Juha-Pekka Soininen, Jari Nurmi
EWSA
2004
Springer
14 years 1 months ago
Generation and Enactment of Controllers for Business Architectures Using MDA
Model Driven Architecture (MDA) is an initiative of the OMG in which the software development process is driven by various software-related models describing the software to be gen...
Günter Graw, Peter Herrmann