Sciweavers

6293 search results - page 112 / 1259
» Information Flow Testing
Sort
View
162
Voted
DAWAK
2009
Springer
15 years 6 months ago
Visual Modelling of Data Warehousing Flows with UML Profiles
Data warehousing involves complex processes that transform source data through several stages to deliver suitable information ready to be analysed. Though many techniques for visua...
Jesús Pardillo, Matteo Golfarelli, Stefano ...
145
Voted
STVR
2010
80views more  STVR 2010»
14 years 9 months ago
Testing coupling relationships in object-oriented programs
As we move to developing object-oriented programs, the complexity traditionally found in functions and procedures is moving to the connections among components. Different faults o...
Roger T. Alexander, Jeff Offutt, Andreas Stefik
CSFW
2007
IEEE
15 years 6 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
135
Voted
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 6 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
ERSHOV
2006
Springer
15 years 4 months ago
Security for Multithreaded Programs Under Cooperative Scheduling
Abstract. Information flow exhibited by multithreaded programs is subtle because the attacker may exploit scheduler properties when deducing secret information from publicly observ...
Alejandro Russo, Andrei Sabelfeld