Sciweavers

198 search results - page 17 / 40
» Describing Secure Interfaces with Interface Automata
Sort
View
BCSHCI
2009
13 years 8 months ago
Digital parenting: designing children's safety
In this paper, I describe an ethnographic study of children and parents looking at issues of domestic privacy and security. I will provide an overview of parental rules and strate...
Jennifer A. Rode
OOPSLA
2007
Springer
14 years 5 months ago
Randoop: feedback-directed random testing for Java
RANDOOP FOR JAVA generates unit tests for Java code using feedback-directed random test generation. Below we describe RANDOOP’s input, output, and test generation algorithm. We ...
Carlos Pacheco, Michael D. Ernst
GCC
2003
Springer
14 years 4 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
CHIMIT
2009
ACM
14 years 5 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
DOCENG
2003
ACM
14 years 4 months ago
UpLib: a universal personal digital library system
We describe the design and use of a personal digital library system, UpLib. The system consists of a full-text indexed repository accessed through an active agent via a Web interf...
William C. Janssen, Kris Popat