Sciweavers

418 search results - page 40 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
CORR
2011
Springer
150views Education» more  CORR 2011»
13 years 3 months ago
Program Optimization Based Pointer Analysis and Live Stack-Heap Analysis
In this paper, we present type systems for flow-sensitive pointer analysis, live stack-heap (variables) analysis, and program optimization. The type system for live stack-heap ana...
Mohamed A. El-Zawawy
SAFECOMP
2007
Springer
14 years 2 months ago
A Comparison of Partitioning Operating Systems for Integrated Systems
In present-day electronic systems, application subsystems from different vendors and with different criticality levels are integrated within the same hardware. Hence, encapsulati...
Bernhard Leiner, Martin Schlager, Roman Obermaisse...
BIS
2007
183views Business» more  BIS 2007»
13 years 10 months ago
A Conceptual Framework for Composition in Business Process Management
In this work, we present a conceptual framework for deriving executable business process models from high-level, graphical business process models based on the paradigm of Service-...
Ingo Weber, Ivan Markovic, Christian Drumm
ICECCS
1997
IEEE
114views Hardware» more  ICECCS 1997»
14 years 1 months ago
An approach to integration testing based on architectural descriptions
Software architectures can play a role in improving the testing process of complex systems. In particular, descriptions of the software architecture can be useful to drive integra...
Antonia Bertolino, Paola Inverardi, Henry Muccini,...
CSREASAM
2006
13 years 10 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin