Sciweavers

5475 search results - page 11 / 1095
» Model Driven Security
Sort
View
IEEEARES
2008
IEEE
14 years 4 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...
OOPSLA
2010
Springer
13 years 8 months ago
Symbolic heap abstraction with demand-driven axiomatization of memory invariants
Heap Abstraction with Demand-Driven Axiomatization of Memory Invariants Isil Dillig Thomas Dillig Alex Aiken Stanford University lig Thomas Dillig Alex Aiken Symbolic Heap Abstract...
Isil Dillig, Thomas Dillig, Alex Aiken
DBSEC
2006
125views Database» more  DBSEC 2006»
13 years 11 months ago
Aspect-Oriented Risk Driven Development of Secure Applications
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Geri Georg, Siv Hilde Houmb, Indrakshi Ray