Sciweavers

682 search results - page 11 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
TOOLS
2008
IEEE
14 years 1 months ago
Engineering Associations: From Models to Code and Back through Semantics
Association between classes is a central construct in OO modeling. However, precise semantics of associations has not been defined, and only the most basic types are implemented i...
Zinovy Diskin, Steve M. Easterbrook, Jürgen D...
CCS
2008
ACM
13 years 9 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
ASWEC
2005
IEEE
14 years 1 months ago
A Comparison of Reverse Engineering Tools Based on Design Pattern Decomposition
The usefulness of design patterns in forward engineering is already well-known and several tools provide support for their application in the development of software systems. Whil...
Francesca Arcelli Fontana, Stefano Masiero, Claudi...
SYNASC
2005
IEEE
119views Algorithms» more  SYNASC 2005»
14 years 1 months ago
A Reference Implementation of ADF (Agent Developing Framework): Semantic Web-Based Agent Communication
The purpose of this paper is to present the main characteristics of ADF, an open source agent developing platform with a focus on agent collaboration. The basic architecture of th...
Catalin Hritcu, Sabin C. Buraga
C3S2E
2009
ACM
13 years 11 months ago
A verification framework for access control in dynamic web applications
This paper proposes a security analysis framework for dynamic web applications. A reverse engineering process is performed over a dynamic web application to extract a rolebased ac...
Manar H. Alalfi, James R. Cordy, Thomas R. Dean