Sciweavers

318 search results - page 38 / 64
» An Experimental Ambiguity Detection Tool
Sort
View
WWW
2007
ACM
14 years 8 months ago
A fault model and mutation testing of access control policies
To increase confidence in the correctness of specified policies, policy developers can conduct policy testing by supplying typical test inputs (requests) and subsequently checking...
Evan Martin, Tao Xie
ICSE
2007
IEEE-ACM
14 years 8 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
KBSE
2007
IEEE
14 years 2 months ago
Finding errors in components that exchange xml data
Two or more components (e.g., objects, modules, or programs) interoperate when they exchange data, such as XML data. Using Application Programming Interface (API) calls exported b...
Mark Grechanik
ESE
2008
112views Database» more  ESE 2008»
13 years 8 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
JMLR
2006
147views more  JMLR 2006»
13 years 8 months ago
Spam Filtering Based On The Analysis Of Text Information Embedded Into Images
In recent years anti-spam filters have become necessary tools for Internet service providers to face up to the continuously growing spam phenomenon. Current server-side anti-spam ...
Giorgio Fumera, Ignazio Pillai, Fabio Roli