Sciweavers

409 search results - page 61 / 82
» How to Design Practical Test Cases
Sort
View
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
14 years 3 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
IACR
2011
104views more  IACR 2011»
12 years 9 months ago
Collusion Resistant Obfuscation and Functional Re-encryption
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
Nishanth Chandran, Melissa Chase, Vinod Vaikuntana...
MOMPES
2007
IEEE
14 years 4 months ago
Adopting Computational Independent Models for Derivation of Architectural Requirements of Software Product Lines
The alignment of the software architecture and the functional requirements of a system is a demanding task because of the difficulty in tracing design elements to requirements. Th...
Alexandre Bragança, Ricardo Jorge Machado
CCS
2007
ACM
14 years 4 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
GI
2005
Springer
14 years 3 months ago
Programming in the Large based on the Business Process Modelling Notation
: A software application is related to the processes it supports. Today, UML diagrams esp. use case diagrams and activity diagrams are often used to model the relevant aspects of t...
Christian Emig, Christof Momm, Jochen Weisser, Seb...