Sciweavers

122 search results - page 16 / 25
» Capturing organizational wisdom for effective software devel...
Sort
View
ACSAC
1999
IEEE
14 years 22 hour ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
SIGADA
2001
Springer
14 years 4 days ago
Automating software module testing for FAA certification
Automatic software testing is gradually becoming accepted practice in the software industry. The shrinking development cycle and higher expectation of software quality are forcing...
Usha Santhanam
ICSE
2007
IEEE-ACM
14 years 7 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
APSEC
2005
IEEE
14 years 1 months ago
Describing and Verifying Integrated Services of Home Network Systems
This paper presents a framework to specify and verify integrated services of a home network system (HNS). We first develop a modeling language to describe the HNS and the integra...
Pattara Leelaprute, Tatsuhiro Tsuchiya, Tohru Kiku...
ER
2006
Springer
98views Database» more  ER 2006»
13 years 11 months ago
Domain Analysis for Supporting Commercial Off-the-Shelf Components Selection
Though new technological trends and paradigms arise for developing complex software systems, systematic reuse continues to be an elusive goal. In this context, the adoption of Comm...
Claudia P. Ayala, Xavier Franch