Sciweavers

568 search results - page 35 / 114
» Enforcing traceability in software
Sort
View
ESORICS
2009
Springer
14 years 1 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...
TPDS
2010
142views more  TPDS 2010»
13 years 8 months ago
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
Abstract—Vehicular Ad Hoc Network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause d...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
REFSQ
2010
Springer
13 years 8 months ago
Challenges in Aligning Requirements Engineering and Verification in a Large-Scale Industrial Context
[Context and motivation] When developing software, coordination between different organizational units is essential in order to develop a good quality product, on time and within b...
Giedre Sabaliauskaite, Annabella Loconsole, Emelie...
IBERAMIA
2004
Springer
14 years 3 months ago
Checking Social Properties of Multi-agent Systems with Activity Theory
Many approaches of the agent paradigm emphasize the social and intentional features of their systems, what are called social properties. The study of these aspects demands their ow...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
AOSD
2011
ACM
13 years 5 months ago
Experiences documenting and preserving software constraints using aspects
Software systems are increasingly being built as compositions of reusable artifacts (components, frameworks, toolkits, plug-ins, APIs, etc) that have non-trivial usage constraints...
Roberto Silveira Silva Filho, François Bron...