Sciweavers

19003 search results - page 108 / 3801
» We Need Assurance!
Sort
View
JCP
2008
116views more  JCP 2008»
13 years 9 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
ICSM
2009
IEEE
13 years 6 months ago
Visualizing the structure of field testing problems
Field testing of a software application prior to general release is an important and essential quality assurance step. Field testing helps identify unforeseen problems. Extensive ...
Brian Chan, Ying Zou, Ahmed E. Hassan, Anand Sinha
COMSWARE
2007
IEEE
14 years 3 months ago
Bridging the Network Reservation Gap Using Overlays
— We propose the concept of Overlay-linked IntServ (OLIntServ), a system architecture that combines network overlays with intra-domain QoS to provide assured communications over ...
Angelos Stavrou, David Turner, Angelos D. Keromyti...
COMPSAC
2006
IEEE
14 years 3 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
WORDS
2005
IEEE
14 years 2 months ago
A Graph-Based Model for Component-Based Software Development
Software metrics can be used to objectively quantify the quality of software components and systems, alleviating quality and risk concerns and raising assurance in component-based...
Sahra Sedigh-Ali, Arif Ghafoor