Sciweavers

568 search results - page 27 / 114
» Enforcing traceability in software
Sort
View
WICSA
2008
13 years 11 months ago
Using Types to Enforce Architectural Structure
The right software architecture is critical to achieving essential quality attributes, but these qualities are only realized if the program as implemented conforms to its intended...
Jonathan Aldrich
RE
2008
Springer
13 years 8 months ago
Supporting Requirements Model Evolution throughout the System Life-Cycle
Requirements models are essential not just during system implementation, but also to manage system changes post-implementation. Such models should be supported by a requirements m...
Neil A. Ernst, John Mylopoulos, Yijun Yu, Tien Ngu...
JHSN
2006
267views more  JHSN 2006»
13 years 10 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
GRID
2003
Springer
14 years 3 months ago
Policy and Enforcement in Virtual Organizations
Arguably, the main goal of Grid Computing is to facilitate the creation of Virtual Organizations (VOs); however, to date, not enough attention has been placed on the policies and ...
Glenn S. Wasson, Marty Humphrey
USS
2004
13 years 11 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...