Sciweavers

1177 search results - page 111 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
ICSE
2004
IEEE-ACM
14 years 9 months ago
A Framework for Ensuring and Improving Dependability in Highly Distributed Systems
A distributed software system's deployment architecture can have a significant impact on the system's dependability. Dependability is a function of various system paramet...
Sam Malek, Nels Beckman, Marija Mikic-Rakic, Nenad...
SACMAT
2006
ACM
14 years 2 months ago
Information flow property preserving transformation of UML interaction diagrams
We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams. The approach is formally underpinned b...
Fredrik Seehusen, Ketil Stølen
ESWS
2007
Springer
14 years 3 months ago
Empowering Software Maintainers with Semantic Web Technologies
Abstract. Software maintainers routinely have to deal with a multitude of artifacts, like source code or documents, which often end up disconnected, due to their different represen...
René Witte, Yonggang Zhang, Juergen Rilling
ICSE
2001
IEEE-ACM
14 years 1 months ago
Generating Wrappers for Command Line Programs: The Cal-Aggie Wrap-O-Matic Project
Software developers writing new software have strong incentives to make their products compliant to standards such as corba, com, and JavaBeans. Standardscompliance facilitates in...
Eric Wohlstadter, Stoney Jackson, Premkumar T. Dev...
CCS
2004
ACM
14 years 2 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash