Sciweavers

89 search results - page 11 / 18
» Aspect-Oriented Risk Driven Development of Secure Applicatio...
Sort
View
WWW
2005
ACM
14 years 8 months ago
Web services security configuration in a service-oriented architecture
Security is one of the major concerns when developing missioncritical business applications, and this concern motivated the Web Services Security specifications. However, the exis...
Takeshi Imamura, Michiaki Tatsubori, Yuichi Nakamu...
ICRA
2010
IEEE
154views Robotics» more  ICRA 2010»
13 years 6 months ago
Design and analysis of a soft mobile robot composed of multiple thermally activated joints driven by a single actuator
— Soft robotic systems have applications in industrial, medical, and security applications. Many applications require these robots to be small and lightweight. One challenge in d...
Nadia Cheng, Genya Ishigami, Stephan Hawthorne, Ha...
JIPS
2010
162views more  JIPS 2010»
13 years 2 months ago
Intercepting Filter Approach to Injection Flaws
The growing number of web applications in the global economy has made it critically important to develop secure and reliable software to support the economy's increasing depen...
Ahmed Salem
ICSE
1999
IEEE-ACM
13 years 12 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
IEEEARES
2008
IEEE
14 years 2 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...