Sciweavers

210 search results - page 11 / 42
» Secure Java Development with UML
Sort
View
ASM
2010
ASM
13 years 11 months ago
Applying the B Method for the Rigorous Development of Smart Card Applications
Abstract. Smart Card applications usually require reliability and security to avoid incorrect operation or access violation in transactions and corruption or undue access to stored...
Bruno Emerson Gurgel Gomes, David Déharbe, ...
HICSS
2002
IEEE
152views Biometrics» more  HICSS 2002»
14 years 2 months ago
Security Considerations for Distributed Web-Based E-commerce Applications in Java
Today’s distributed e-commerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side processing and an ...
Timothy E. Lindquist
GG
2008
Springer
13 years 10 months ago
Model-Driven Development of Model Transformations
The model-driven development of model transformations requires both a technique to model model transformations as well as a means to transform transformation models. Therefore, t...
Pieter Van Gorp
VL
2005
IEEE
159views Visual Languages» more  VL 2005»
14 years 3 months ago
Executable Visual Contracts
Design by Contract (DbC) is widely acknowledged to be a powerful technique for creating reliable software. DbC allows developers to specify the behavior of an operation precisely ...
Marc Lohmann, Stefan Sauer, Gregor Engels
ACSAC
2006
IEEE
14 years 3 months ago
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple “toyâ...
Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew Mc...