Sciweavers

568 search results - page 28 / 114
» Enforcing traceability in software
Sort
View
CCS
2008
ACM
13 years 12 months ago
Efficient and extensible security enforcement using dynamic data flow analysis
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper, we solve both of these issues with an extensible system that is an order of magni...
Walter Chang, Brandon Streiff, Calvin Lin
IJFCS
2006
119views more  IJFCS 2006»
13 years 10 months ago
Enforcing Concurrent Temporal Behaviors
The outcome of verifying software is often a `counterexample', i.e., a listing of the actions and states of a behavior not satisfying the specification. In order to understan...
Doron Peled, Hongyang Qu
WER
2007
Springer
14 years 4 months ago
O Gerenciamento de Requisitos no Ambiente COCAR
Background. This research group has been working towards building an environment which helps software development, providing support to some activities mainly based on use case mo...
André Di Thommazo, Marcos Danilo Martins, S...
ASWEC
2010
IEEE
13 years 10 months ago
Scenario-Based Validation: Beyond the User Requirements Notation
—A quality-driven approach to software development and testing demands that, ultimately, the requirements of stakeholders be validated against the actual behavior of an implement...
Dave Arnold, Jean-Pierre Corriveau, Wei Shi
CCS
2009
ACM
14 years 10 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong