Sciweavers

2270 search results - page 419 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
ISSTA
2006
ACM
15 years 9 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
133
Voted
PADS
2006
ACM
15 years 9 months ago
SOAr-DSGrid: Service-Oriented Architecture for Distributed Simulation on the Grid
Simulation is a low cost alternative to experimentation on real-world physical systems. Grid technology enables coordinated use of and secure access to distributed computing resou...
Xinjun Chen, Wentong Cai, Stephen John Turner, Yon...
147
Voted
PASTE
2005
ACM
15 years 9 months ago
Low overhead program monitoring and profiling
Program instrumentation, inserted either before or during execution, is rapidly becoming a necessary component of many systems. Instrumentation is commonly used to collect informa...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa
168
Voted
CISC
2006
Springer
131views Cryptology» more  CISC 2006»
15 years 7 months ago
Efficient Intrusion-Resilient Signatures Without Random Oracles
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into di...
Benoît Libert, Jean-Jacques Quisquater, Moti...
136
Voted
APBC
2003
123views Bioinformatics» more  APBC 2003»
15 years 5 months ago
A Platform for the Description, Distribution and Analysis of Genetic Polymorphism Data
In this paper we suggest the requirements for an open platform designed for the description, distribution and analysis of genetic polymorphism data. This platform is discussed in ...
Greg D. Tyrelle, Garry C. King