Sciweavers

759 search results - page 66 / 152
» What Can Be Implemented Anonymously
Sort
View
COMPSAC
2008
IEEE
14 years 4 months ago
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming
The lifecycle mismatch between vehicles and their IT system poses a problem for the automotive industry. Such systems need to be open and extensible to provide customised function...
Phu H. Phung, David Sands
RE
2004
Springer
14 years 3 months ago
From Aspectual Requirements to Proof Obligations for Aspect-Oriented Systems
Aspect-oriented software development (AOSD) techniques support systematic modularization and composition of crosscutting concerns. Though AOSD techniques have been proposed to han...
Shmuel Katz, Awais Rashid
FLOPS
2004
Springer
14 years 1 months ago
Analysing Definitional Trees: Looking for Determinism
Abstract. This paper describes how high level implementations of (needed) narrowing into Prolog can be improved by analysing definitional trees. First, we introduce a refined repre...
Pascual Julián Iranzo, Christian Villamizar...
SCP
2008
86views more  SCP 2008»
13 years 10 months ago
Quantifying the yield of risk-bearing IT-portfolios
We proposed a method to quantify the yield of an IT-investment portfolio in an environment of uncertainty and risk. For various common implementation scenarios such as growing dem...
R. J. Peters, Chris Verhoef
CCS
2004
ACM
14 years 3 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon