Sciweavers

410 search results - page 11 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
ESE
2006
95views Database» more  ESE 2006»
13 years 7 months ago
Input validation analysis and testing
This research addresses the problem of statically analyzing input command syntax as defined in interface and requirements specifications and then generating test cases for dynamic ...
Jane Huffman Hayes, Jeff Offutt
SAC
2005
ACM
14 years 1 months ago
A case study of separation of duty properties in the context of the Austrian "eLaw" process
Over the last few years rapid progress has been made in moving from conceptual studies, “whitepapers” and initiatives to the actual deployment of e-Government systems [13]. In...
Andreas Schaad, Pascal Spadone, Helmut Weichsel
AINA
2008
IEEE
13 years 9 months ago
A Case Study on Software Evolution towards Service-Oriented Architecture
The evolution of any software product over its lifetime is unavoidable, caused both by bugs to be fixed and by new requirements appearing in the later stages of the product's...
Félix Cuadrado, Boni García, Juan C....
AOSD
2007
ACM
13 years 9 months ago
The service creation environment: a telecom case study
Composing web services using current web service composition languages (such as BPEL) requires a large amount of in-depth knowledge. This paper introduces a service creation envir...
Niels Joncheere
POLICY
2007
Springer
14 years 1 months ago
An Automated Framework for Validating Firewall Policy Enforcement
The implementation of network security devices such as firewalls and IDSs are constantly being improved to accommodate higher security and performance standards. Using reliable a...
Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-S...