Sciweavers

568 search results - page 25 / 114
» Enforcing traceability in software
Sort
View
SIGADA
2004
Springer
14 years 3 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
DRM
2003
Springer
14 years 3 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
CSMR
2002
IEEE
14 years 3 months ago
Evolution Support by Homogeneously Documenting Patterns, Aspects and Traces
The evolution of complex software systems is promoted by software engineering principles and techniques like separation of concerns, encapsulation, stepwise refinement, and reusab...
Johannes Sametinger, Matthias Riebisch
SIGPLAN
2008
13 years 10 months ago
Verified enforcement of stateful information release policies
Many organizations specify information release policies to describe the terms under which sensitive information may be released to other organizations. This paper presents a new a...
Nikhil Swamy, Michael Hicks
ACSAC
2007
IEEE
14 years 4 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo