Sciweavers

1005 search results - page 58 / 201
» Information systems security engineering: a critical compone...
Sort
View
ESSOS
2010
Springer
14 years 3 months ago
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
Ben H. Smith, Laurie Williams, Andrew Austin
EWSA
2006
Springer
14 years 16 days ago
Component Deployment Evolution Driven by Architecture Patterns and Resource Requirements
Software architectures are often designed with respect to some architecture patterns, like the pipeline and peer-to-peer. These patterns are the guarantee of some quality attribute...
Didier Hoareau, Chouki Tibermacine
SACMAT
2006
ACM
14 years 2 months ago
Information flow property preserving transformation of UML interaction diagrams
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
Fredrik Seehusen, Ketil Stølen
SEKE
2005
Springer
14 years 2 months ago
Application of Design Combinatorial Theory to Scenario-Based Software Architecture Analysis
Design combinatorial theory for test-case generation has been used successfully in the past. It is useful in optimizing test cases as it is practically impossible to exhaustively t...
Chung-Horng Lung, Marzia Zaman
ICMI
2007
Springer
135views Biometrics» more  ICMI 2007»
14 years 3 months ago
Natural multimodal dialogue systems: a configurable dialogue and presentation strategies component
In the context of natural multimodal dialogue systems, we address the challenging issue of the definition of cooperative answers in an appropriate multimodal form. Highlighting th...
Meriam Horchani, Benjamin Caron, Laurence Nigay, F...