Sciweavers

37 search results - page 8 / 8
» Generating Counterexamples for Multi-valued Model-Checking
Sort
View
SIGSOFT
2005
ACM
14 years 10 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
CCGRID
2006
IEEE
14 years 3 months ago
Component-Based Modeling, Analysis and Animation
Component-based software construction is widely used in a variety of applications, from embedded environments to grid computing. However, errors in these applications and systems ...
Jeff Kramer