Sciweavers

2429 search results - page 198 / 486
» Using Aspects to Design a Secure System
Sort
View
127
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner
133
Voted
ASWEC
2005
IEEE
15 years 8 months ago
A Comparison of Reverse Engineering Tools Based on Design Pattern Decomposition
The usefulness of design patterns in forward engineering is already well-known and several tools provide support for their application in the development of software systems. Whil...
Francesca Arcelli Fontana, Stefano Masiero, Claudi...
137
Voted
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
15 years 8 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao
142
Voted
CSCW
2006
ACM
15 years 8 months ago
Designing task visualizations to support the coordination of work in software development
Software development tools primarily focus on supporting the technical work. Yet no matter the tools employed, the process followed, or the size of the team, important aspects of ...
Christine A. Halverson, Jason B. Ellis, Catalina D...
104
Voted
ER
1998
Springer
106views Database» more  ER 1998»
15 years 6 months ago
Chrono: A Conceptual Design Framework for Temporal Entities
Abstract. Database applications are frequently faced with the necessity of representing time varying information and, particularly in the management of information systems, a few k...
Sonia Bergamaschi, Claudio Sartori