Sciweavers

3914 search results - page 282 / 783
» Automating SLA modeling
Sort
View
LPAR
2007
Springer
14 years 2 months ago
Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap
Operational models of (security) protocols, on one hand, are readable and conveniently match their implementation (at a certain abstraction level). Epistemic models, on the other h...
Francien Dechesne, Mohammad Reza Mousavi, Simona O...
IMR
2003
Springer
14 years 1 months ago
Unified Geometry Access for Analysis and Design
This paper presents a comprehensive approach for CAD based geometry handling in support of single and multidisciplinary analysis and design. Unlike previous schemes, the model pre...
Robert Haimes, Curran Crawford
INAP
2001
Springer
14 years 23 days ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
ISSE
2010
13 years 6 months ago
URDAD as a semi-formal approach to analysis and design
The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object M...
Fritz Solms, Dawid Loubser
GI
2009
Springer
13 years 6 months ago
Specification based testing of automotive human machine interfaces
Abstract: Model based testing promises systematic test coverage in a continuous testing process. However, in practice, model based testing struggles with informal specifications, d...
Holger Grandy, Sebastian Benz