Sciweavers

3523 search results - page 57 / 705
» Feature interaction in policies
Sort
View
ECBS
2006
IEEE
203views Hardware» more  ECBS 2006»
14 years 1 months ago
The Feature-Architecture Mapping (FArM) Method for Feature-Oriented Development of Software Product Lines
Software product lines (PLs) are large, complex systems, demanding high maintainability and enhanced flexibility. Nonetheless, in the state of the art PL methods, features are sca...
Periklis Sochos, Matthias Riebisch, Ilka Philippow
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
14 years 10 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
SASO
2009
IEEE
14 years 4 months ago
Distributed W-Learning: Multi-Policy Optimization in Self-Organizing Systems
—Large-scale agent-based systems are required to self-optimize towards multiple, potentially conflicting, policies of varying spatial and temporal scope. As a result, not all ag...
Ivana Dusparic, Vinny Cahill
POLICY
2001
Springer
14 years 2 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
JCP
2008
116views more  JCP 2008»
13 years 10 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...