Sciweavers

211 search results - page 18 / 43
» Computational Evaluation of Software Security Attributes
Sort
View
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
14 years 2 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
SACMAT
2010
ACM
14 years 14 days ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
AMAST
2004
Springer
14 years 1 months ago
Counting Votes with Formal Methods
This abstract provides some background information about the electronic voting experiment that is planned in the Netherlands for the European Elections of 2004, and about our own i...
Bart Jacobs
OOPSLA
2004
Springer
14 years 1 months ago
Method-level phase behavior in java workloads
Java workloads are becoming more and more prominent on various computing devices. Understanding the behavior of a Java workload which includes the interaction between the applicat...
Andy Georges, Dries Buytaert, Lieven Eeckhout, Koe...
ICMT
2009
Springer
14 years 7 days ago
Solving Constraints in Model Transformations
Abstract. Constraint programming holds many promises for model driven software development (MDSD). Up to now, constraints have only started to appear in MDSD modeling languages, bu...
Andreas Petter, Alexander Behring, Max Mühlh&...