Sciweavers

2429 search results - page 155 / 486
» Using Aspects to Design a Secure System
Sort
View
AAAI
1994
13 years 10 months ago
An Experiment in the Design of Software Agents
We describe a bottom-up approach to the design of software agents. We built and tested an agent system that addresses the real-world problem of handling the activities involved in...
Henry A. Kautz, Bart Selman, Michael H. Coen, Stev...
DS
1997
104views Database» more  DS 1997»
13 years 10 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi
PDC
2004
ACM
14 years 2 months ago
Socio-technical walkthrough: designing technology along work processes
How can the documentation of concepts for complex sociotechnical systems, such as the adoption of groupware, be incorporated into practices of PD? Documents are important in suppo...
Thomas Herrmann, Gabriele Kunau, Kai-Uwe Loser, Na...
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 9 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
PLDI
2006
ACM
14 years 3 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober