Sciweavers

1629 search results - page 271 / 326
» Infeasible Code Detection
Sort
View
IWPSE
2007
IEEE
14 years 4 months ago
Visual identification of software evolution patterns
Software evolution plays a key role in the overall lifecycle of a software system. In this phase, software developers extend the capabilities and functionality of the system to me...
Andrejs Jermakovics, Marco Scotto, Giancarlo Succi
KBSE
2007
IEEE
14 years 4 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
KBSE
2007
IEEE
14 years 4 months ago
Finding errors in components that exchange xml data
Two or more components (e.g., objects, modules, or programs) interoperate when they exchange data, such as XML data. Using Application Programming Interface (API) calls exported b...
Mark Grechanik
ECOOP
2007
Springer
14 years 4 months ago
Morphing: Safely Shaping a Class in the Image of Others
We present MJ: a language for specifying general classes whose members are produced by iterating over members of other classes. We call this technique “class morphing” or just ...
Shan Shan Huang, David Zook, Yannis Smaragdakis
FOSAD
2007
Springer
14 years 4 months ago
Secure Service Orchestration
Abstract. We present a framework for designing and composing services in a secure manner. Services can enforce security policies locally, and can invoke other services in a “call...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...