Sciweavers

3792 search results - page 34 / 759
» Techniques for Trusted Software Engineering
Sort
View
111
Voted
SERP
2003
15 years 4 months ago
Exploring Roles for the UML Diagrams in Software Performance Engineering
It is not an overstatement to say that the gap between software design and performance evaluation techniques has caused the misuse of the last ones by software engineers. The UML ...
José Merseguer, Javier Campos
151
Voted
CSE
2008
IEEE
15 years 10 months ago
A Trust Model Applied to E-mail Servers
E-mail services are essential in the Internet. However, the basic e-mail architecture presents problems that opens it to several threats. Alternatives have been proposed to solve ...
Leonardo de Oliveira, Carlos Maziero
152
Voted
ISSTA
2010
ACM
15 years 7 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
107
Voted
SIGSOFT
2008
ACM
16 years 4 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
127
Voted
VMCAI
2005
Springer
15 years 9 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes