Sciweavers

1288 search results - page 177 / 258
» Securing aspect composition
Sort
View
CEAS
2006
Springer
15 years 6 months ago
Teaching Spam and Spyware at the University of C@1g4ry
The University of Calgary is attacking the problems of spam and spyware from the angle of education. "Spam and Spyware" is a computer science course offered at both the ...
John Aycock
JAISE
2011
243views more  JAISE 2011»
14 years 9 months ago
Safeguards in a world of ambient intelligence: A social, economic, legal, and ethical perspective
The book “Safeguards in a world of ambient intelligence” is unique in its kind. It discusses social, economic, legal, technological and ethical issues related to identity, priv...
Egon L. van den Broek
ICSE
2009
IEEE-ACM
16 years 3 months ago
Modular string-sensitive permission analysis with demand-driven precision
In modern software systems, programs are obtained by dynamically assembling components. This has made it necessary to subject component providers to access-control restrictions. W...
Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Ba...
SOCO
2009
Springer
15 years 9 months ago
Specifying and Composing Non-functional Requirements in Model-Based Development
Abstract. Non-functional requirements encompass important design concerns such as schedulability, security, and communication constraints. In model-based development they non-local...
Ethan K. Jackson, Dirk Seifert, Markus Dahlweid, T...
CONCUR
2001
Springer
15 years 7 months ago
Probabilistic Information Flow in a Process Algebra
We present a process algebraic approach for extending to the probabilistic setting the classical logical information flow analysis of computer systems. In particular, we employ a ...
Alessandro Aldini