Sciweavers

3330 search results - page 219 / 666
» software 2010
Sort
View
CISIS
2010
IEEE
15 years 7 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
97
Voted
WOSP
2010
ACM
15 years 7 months ago
A general result for deriving product-form solutions in markovian models
In this paper we provide a general method to derive productform solutions for stochastic models. We take inspiration from the Reversed Compound Agent Theorem [14] and we provide a...
Andrea Marin, Maria Grazia Vigliotti
93
Voted
CAISE
2010
Springer
15 years 1 months ago
Interaction-Driven Self-adaptation of Service Ensembles
Abstract. The emergence of large-scale online collaboration requires current information systems to be apprehended as service ensembles comprising human and software service entiti...
Christoph Dorn, Schahram Dustdar
101
Voted
TRUST
2010
Springer
14 years 11 months ago
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
The TPM is a fairly passive entity. As a result, it can be difficult to involve the TPM in measurements of software trustworthiness beyond simple load-time hashing of static progra...
Sergey Bratus, Michael E. Locasto, Brian Schulte
182
Voted
IFM
2010
Springer
205views Formal Methods» more  IFM 2010»
14 years 10 months ago
Adding Change Impact Analysis to the Formal Verification of C Programs
Handling changes to programs and specifications efficiently is a particular challenge in formal software verification. Change impact analysis is an approach to this challenge where...
Serge Autexier, Christoph Lüth