Sciweavers

6167 search results - page 1024 / 1234
» Can Refinement be Automated
Sort
View
CCS
2007
ACM
14 years 2 months ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...
ECOOP
2007
Springer
14 years 2 months ago
Making Programmers Aware Of Refactorings
Modern integrated development environments, such as ECLIPSE, provide automated or semi-automated refactoring support. Despite this support, refactorings are often done manually --...
Peter Weißgerber, Benjamin Biegel, Stephan D...
PODC
2010
ACM
14 years 2 months ago
Brief announcement: anonymity and trust in distributed systems
In this paper, we present a framework for achieving anonymity and trust, two seemingly contradictory properties, in distributed systems. Our approach builds on webs of trust, a we...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
FMCAD
2007
Springer
14 years 2 months ago
Improved Design Debugging Using Maximum Satisfiability
In today's SoC design cycles, debugging is one of the most time consuming manual tasks. CAD solutions strive to reduce the inefficiency of debugging by identifying error sourc...
Sean Safarpour, Hratch Mangassarian, Andreas G. Ve...
SOUPS
2010
ACM
14 years 2 months ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
« Prev « First page 1024 / 1234 Last » Next »