Sciweavers

258 search results - page 13 / 52
» Portable secure identity management for software engineering
Sort
View
FSTTCS
2007
Springer
14 years 2 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...
CISIS
2010
IEEE
14 years 3 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
OOPSLA
2005
Springer
14 years 1 months ago
AutAT: an eclipse plugin for automatic acceptance testing of web applications
In this paper we describe AutAT, an open source Eclipse plugin to better enable test driven development of web applications. AutAT lets non-technical people write acceptance tests...
Christian Schwarz, Stein Kåre Skytteren, Tro...
ISORC
2008
IEEE
14 years 2 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
ICSM
2003
IEEE
14 years 1 months ago
Towards a Versioning Model for Component-based Software Assembly
The world of software development has rapidly changed in the last few years due to the adoption of component-based technologies. The classical software configuration management, ...
Jaroslav Gergic