Sciweavers

5843 search results - page 77 / 1169
» Software Security in Practice
Sort
View
110
Voted
ESSOS
2009
Springer
15 years 6 months ago
Pattern-Based Confidentiality-Preserving Refinement
Abstract. We present an approach to security requirements engineering, which makes use of special kinds of problem frames that serve to structure, characterize, analyze, and solve ...
Holger Schmidt
118
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
151
Voted
ASPLOS
2011
ACM
14 years 6 months ago
S2E: a platform for in-vivo multi-path analysis of software systems
This paper presents S2E, a platform for analyzing the properties and behavior of software systems. We demonstrate S2E’s use in developing practical tools for comprehensive perfo...
Vitaly Chipounov, Volodymyr Kuznetsov, George Cand...
144
Voted
IASTEDSEA
2004
15 years 4 months ago
Higher-order strategic programming: A road to software assurance
Program transformation through the repeated application of simple rewrite rules is conducive to formal verification. In practice, program transformation oftentimes requires data t...
Victor L. Winter, Steve Roach, Fares Fraij
CSREASAM
2006
15 years 4 months ago
Design and Implementation of a High-Performance Active Network Security System
This paper describes the design, implementation and performance of a high-performance security system - Active Network Security Immune System (ANSIS)
Wen Ouyang, Kun-Ming Yu, Wen-Ping Lee