Sciweavers

674 search results - page 105 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
TSE
1998
85views more  TSE 1998»
13 years 8 months ago
A Methodology for Feature Interaction Detection in the AIN 0.1 Framework
—In this paper, we propose an integrated methodology for specifying AIN and switch-based features and analyzing their interactions in the AIN 0.1 framework. The specification of ...
Fuchun Joseph Lin, Hong Liu, Abhijit Ghosh
SIGOPSE
1998
ACM
14 years 1 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
EWSA
2004
Springer
14 years 2 months ago
An Architecture Description Language for Mobile Distributed Systems
Mobile software applications have to meet new requirements directly arising from mobility issues. To address these requirements at an early stage in development, an architecture d...
Volker Gruhn, Clemens Schäfer
EDO
2005
Springer
14 years 2 months ago
Experiences in coverage testing of a Java middleware
This paper addresses the issues of test coverage analysis of J2EE servers. These middleware are nowadays at the core of the modern information technology’s landscape. They provi...
Mehdi Kessis, Yves Ledru, Gérard Vandome
CHARME
2005
Springer
94views Hardware» more  CHARME 2005»
14 years 2 months ago
Verifying Quantitative Properties Using Bound Functions
Abstract. We define and study a quantitative generalization of the traditional boolean framework of model-based specification and verification. In our setting, propositions have...
Arindam Chakrabarti, Krishnendu Chatterjee, Thomas...