Sciweavers

1005 search results - page 52 / 201
» Information systems security engineering: a critical compone...
Sort
View
AC
1999
Springer
14 years 1 months ago
The University Student Registration System: A Case Study in Building a High-Availability Distributed Application Using General P
Prior to 1994, student registration at Newcastle University involved students being registered in a single place, where they would present a form which had previously been filled ...
Mark C. Little, Stuart M. Wheater, David B. Ingham...
RE
2010
Springer
13 years 3 months ago
Dependability Arguments with Trusted Bases
An approach is suggested for arguing that a system is dependable. The key idea is to structure the system so that critical requirements are localized in small, reliable subsets of ...
Eunsuk Kang, Daniel Jackson
JCS
2002
115views more  JCS 2002»
13 years 8 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
ER
2006
Springer
121views Database» more  ER 2006»
14 years 16 days ago
Method Chunks for Interoperability
Interoperability is a key property of enterprise applications, which is hard to achieve due to the large number of interoperating components and semantic heterogeneity. Platform-ba...
Jolita Ralyté, Per Backlund, Harald Kü...
TAAS
2010
124views more  TAAS 2010»
13 years 3 months ago
The MACODO organization model for context-driven dynamic agent organizations
stractions that support application developers to describe dynamic organizations. The organization model is part of an integrated approach, called MACODO: Middleware Architecture f...
Danny Weyns, Robrecht Haesevoets, Alexander Helleb...