Sciweavers

12637 search results - page 102 / 2528
» Security for Extensible Systems
Sort
View
BIS
2008
86views Business» more  BIS 2008»
13 years 10 months ago
Specifying Separation of Duty Constraints in BPEL4People Processes
Abstract. Security issues have to be carefully considered for information systems that support the business processes of an organization, in particular, when these systems build on...
Jan Mendling, Karsten Ploesser, Mark Strembeck
ESORICS
2007
Springer
14 years 3 months ago
Security of Multithreaded Programs by Compilation
Abstract. Information security is a pressing challenge for mobile code technologies. In order to claim end-to-end security of mobile code, it is necessary to establish that the cod...
Gilles Barthe, Tamara Rezk, Alejandro Russo, Andre...
OSDI
2006
ACM
14 years 9 months ago
SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques
Feng Zhou, Jeremy Condit, Zachary R. Anderson, Ily...
CIS
2006
Springer
14 years 23 days ago
Security Contexts in Autonomic Systems
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the tradit...
Kaiyu Wan, Vasu S. Alagar
ECBS
2007
IEEE
97views Hardware» more  ECBS 2007»
14 years 3 months ago
A Service-Oriented Extension of the V-Modell XT
The ever growing size and complexity of both technical and business systems requires efficient software engineering approaches to keep development cost under control while still ...
Michael Meisinger, Ingolf Krüger