Sciweavers

770 search results - page 87 / 154
» Experience in e-Science Requirements Engineering
Sort
View
WWW
2010
ACM
14 years 6 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
ESSOS
2009
Springer
14 years 5 months ago
Report: Extensibility and Implementation Independence of the .NET Cryptographic API
Abstract. When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of that algorithm, it is important that software using that algorithm or...
Pieter Philippaerts, Cédric Boon, Frank Pie...
ICSE
2009
IEEE-ACM
14 years 5 months ago
Automated testing of healthcare document transformations in the PICASSO interoperability platform
In every application domain, achieving interoperability among heterogenous information systems is a crucial challenge and alliances are formed to standardize data-exchange formats...
Massimo Pascale, Marcello Roselli, Umberto Rugani,...
WCRE
2009
IEEE
14 years 5 months ago
The Logical Modularity of Programs
Abstract—The principles and best practices of object oriented design require that modules in a program should match logical decomposition of the knowledge that the program implem...
Daniel Ratiu, Radu Marinescu, Jan Jürjens
KBSE
2009
IEEE
14 years 5 months ago
Inferring Method Effect Summaries for Nested Heap Regions
Effect systems are important for reasoning about the side effects of a program. Although effect systems have been around for decades, they have not been widely adopted in practice...
Mohsen Vakilian, Danny Dig, Robert L. Bocchino Jr....