Sciweavers

2253 search results - page 344 / 451
» The ComFoRT Reasoning Framework
Sort
View
ESORICS
2002
Springer
14 years 8 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
PADL
2010
Springer
14 years 5 months ago
Lazy Explanations for Constraint Propagators
Explanations are a technique for reasoning about constraint propagation, which have been applied in many learning, backjumping and user-interaction algorithms for constraint progra...
Ian P. Gent, Ian Miguel, Neil C. A. Moore
FLOPS
2010
Springer
14 years 3 months ago
Applying Constraint Logic Programming to SQL Test Case Generation
We present a general framework for generating SQL query test cases using Constraint Logic Programming. Given a database schema and a SQL view defined in terms of other views and s...
Rafael Caballero, Yolanda García-Ruiz, Fern...
FOSSACS
2009
Springer
14 years 3 months ago
Realizability of Concurrent Recursive Programs
Abstract. We define and study an automata model of concurrent recursive programs. An automaton consists of a finite number of pushdown systems running in parallel and communicati...
Benedikt Bollig, Manuela-Lidia Grindei, Peter Habe...
KBSE
2009
IEEE
14 years 3 months ago
Towards Augmenting Requirements Models with Preferences
—The analysis of stakeholder requirements is a critical aspect of software engineering. A common way of specifying stakeholder requirements is in terms of a hierarchy of goals wh...
Sotirios Liaskos, Sheila A. McIlraith, John Mylopo...