Sciweavers

392 search results - page 26 / 79
» Secure Software Engineering: A New Paradigm
Sort
View
CASC
2006
Springer
128views Mathematics» more  CASC 2006»
14 years 1 months ago
New Domains for Applied Quantifier Elimination
We address various aspects of our computer algebra-based computer logic system redlog. There are numerous examples in the literature for successful applications of redlog to practi...
Thomas Sturm
CODES
2004
IEEE
14 years 1 months ago
Low energy security optimization in embedded cryptographic systems
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
Catherine H. Gebotys
WER
2005
Springer
14 years 3 months ago
Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce
This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method in...
Simara Vieira da Rocha, Zair Abdelouahab, Eduardo ...
KI
2007
Springer
14 years 4 months ago
Proposal of Generalized Rule Programming Model
Abstract. Rule-based programming paradigm is omnipresent in number of engineering domains. However, there are some fundamental semantical differences between it, and classic progr...
Grzegorz J. Nalepa, Igor Wojnicki
ICSE
2008
IEEE-ACM
14 years 10 months ago
The international workshop on software architectures and mobility (SAM 2008)
E-businesses are increasingly facing the need of porting the provision of their e-services to mobile customers. Evolving requirements, such as reliability, security, scalability, ...
Licia Capra, Rami Bahsoon, Wolfgang Emmerich, Moha...