Sciweavers

770 search results - page 87 / 154
» Experience in e-Science Requirements Engineering
Sort
View
WWW
2010
ACM
15 years 10 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
ESSOS
2009
Springer
15 years 10 months ago
Report: Extensibility and Implementation Independence of the .NET Cryptographic API
Abstract. When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of that algorithm, it is important that software using that algorithm or...
Pieter Philippaerts, Cédric Boon, Frank Pie...
ICSE
2009
IEEE-ACM
15 years 10 months ago
Automated testing of healthcare document transformations in the PICASSO interoperability platform
In every application domain, achieving interoperability among heterogenous information systems is a crucial challenge and alliances are formed to standardize data-exchange formats...
Massimo Pascale, Marcello Roselli, Umberto Rugani,...
WCRE
2009
IEEE
15 years 10 months ago
The Logical Modularity of Programs
Abstract—The principles and best practices of object oriented design require that modules in a program should match logical decomposition of the knowledge that the program implem...
Daniel Ratiu, Radu Marinescu, Jan Jürjens
KBSE
2009
IEEE
15 years 10 months ago
Inferring Method Effect Summaries for Nested Heap Regions
Effect systems are important for reasoning about the side effects of a program. Although effect systems have been around for decades, they have not been widely adopted in practice...
Mohsen Vakilian, Danny Dig, Robert L. Bocchino Jr....