Sciweavers

1023 search results - page 164 / 205
» Model Checking: Software and Beyond
Sort
View
SACMAT
2003
ACM
15 years 9 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
ICSE
2001
IEEE-ACM
15 years 8 months ago
Fast Formal Analysis of Requirements via "Topoi Diagrams"
Early testing of requirements can decrease the cost of removing errors in software projects. However, unless done carefully, that testing process can significantly add to the cos...
Tim Menzies, John D. Powell, Michael E. Houle
ECOOPW
1998
Springer
15 years 8 months ago
Workshop Report - ECOOP'98 Workshop 7: Tools and Environments for Business Rules
This workshop focussed on the requirements for tools and environments that support business rules in an object-oriented setting and attempted to provide an overview of possible tec...
Kim Mens, Roel Wuyts, Dirk Bontridder, Alain Grijs...
FASE
2009
Springer
15 years 7 months ago
Interface Generation and Compositional Verification in JavaPathfinder
Abstract. We present a novel algorithm for interface generation of software components. Given a component, our algorithm uses learning techniques to compute a permissive interface ...
Dimitra Giannakopoulou, Corina S. Pasareanu
FUIN
2008
147views more  FUIN 2008»
15 years 3 months ago
A Basic Logic for Reasoning about Connector Reconfiguration
Abstract. Software systems evolve over time. From a component-based software engineering perspective, this means that either the components of the system need to change, or, if com...
Dave Clarke