Sciweavers

419 search results - page 29 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
ICSE
2007
IEEE-ACM
14 years 9 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
CSMR
2006
IEEE
13 years 10 months ago
Search-Based Software Maintenance
The high cost of software maintenance could potentially be greatly reduced by the automatic refactoring of object-oriented programs to increase their understandability, adaptabili...
Mark Kent O'Keeffe, Mel Ó Cinnéide
SPLC
2007
13 years 10 months ago
Mapping Feature Models onto Component Models to Build Dynamic Software Product Lines
Systems such as adaptative and context–aware ones must adapt themselves to changing requirements at runtime. Modeling and implementing this kind of systems is a difficult opera...
Pablo Trinidad, Antonio Ruiz Cortés, Joaqu&...
DAC
1998
ACM
14 years 9 months ago
Software Synthesis of Process-Based Concurrent Programs
We present a Petri net theoretic approach to the software synthesis problem that can synthesize ordinary C programs from processbased concurrent specifications without the need for...
Bill Lin
DRM
2005
Springer
14 years 2 months ago
Watermarking and ownership problem: a revisit
Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of...
Husrev T. Sencar, Nasir D. Memon