Sciweavers

443 search results - page 68 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
CHI
1994
ACM
13 years 11 months ago
Model-based interface development
rom abstract objects like user tasks. ost interface development problems can be traced to two sources: the need for usercentered design environments and the lack of software system...
Angel R. Puerta, Pedro Szkeley
SIAMCOMP
2010
83views more  SIAMCOMP 2010»
13 years 6 months ago
Reaching and Distinguishing States of Distributed Systems
Some systems interact with their environment at physically distributed interfaces, called ports, and in testing such a system it is normal to place a tester at each port. Each test...
Robert M. Hierons
IACR
2011
86views more  IACR 2011»
12 years 7 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
TASE
2010
IEEE
13 years 2 months ago
Intelligent Component-Based Automation of Baggage Handling Systems With IEC 61499
Airport Baggage Handling is a field of automation systems that is currently dependent on centralised control systems and conventional automation programming techniques. In this and...
Geoff Black, Valeriy Vyatkin
ICSE
2007
IEEE-ACM
14 years 7 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...