Sciweavers

425 search results - page 48 / 85
» Audit
Sort
View
GIS
2010
ACM
13 years 6 months ago
INTACT: a spatial query integrity assurance framework for location-based services
It is cost-effective for data owners to publicize their spatial databases via database outsourcing; however, data privacy and query integrity are major challenges. In this demonst...
Chih-Jye Wang, Wei-Shinn Ku, Ling Hu, Cyrus Shahab...
ER
2010
Springer
124views Database» more  ER 2010»
13 years 5 months ago
Integrity Assurance for RESTful XML
The REpresentational State Transfer (REST) represents an extensible, easy and elegant architecture for accessing web-based resources. REST alone and in combination with XML is fast...
Sebastian Graf, Lukas Lewandowski, Marcel Waldvoge...
ECEASST
2010
13 years 5 months ago
Open Source Verification under a Cloud
Abstract: An experiment in providing volunteer cloud computing support for automated audits of open source code is described here, along with the supporting theory. Certification a...
Peter T. Breuer, Simon Pickin
CORR
2011
Springer
195views Education» more  CORR 2011»
12 years 11 months ago
Platform for Assessing Strategic Alignment Using Enterprise Architecture: Application to E-Government Process Assessment
This paper presents an overview of S2AEA (v2) (Strategic Alignment Assessment based on Enterprise Architecture (version2)), a platform for modelling enterprise architecture and fo...
Kaoutar Elhari, Bouchaib Bounabat
ICSE
2012
IEEE-ACM
11 years 10 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...