Sciweavers

COMPSAC
2008
IEEE
14 years 6 months ago
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming
The lifecycle mismatch between vehicles and their IT system poses a problem for the automotive industry. Such systems need to be open and extensible to provide customised function...
Phu H. Phung, David Sands
COMPSAC
2008
IEEE
14 years 6 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
COMPSAC
2008
IEEE
14 years 6 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang
COMPSAC
2008
IEEE
14 years 6 months ago
OntoArch Approach for Reliability-Aware Software Architecture Development
Reliability-aware software architecture development has recently been gaining growing attention among software architects. This paper tackles the issue by introducing an ontology-...
Jiehan Zhou, Eila Niemelä, Antti Evesti, Anne...
COMPSAC
2008
IEEE
14 years 6 months ago
Utilising Located Functions to Model and Optimise Distributed Computations
With developments in Grid computing and Web based data storage the task of orchestrating computations is becoming ever more difficult. Identifying which of the available computati...
Stephen Crouch, Peter Henderson, Robert John Walte...
COMPSAC
2008
IEEE
14 years 6 months ago
Metamodeling Autonomic System Management Policies - Ongoing Works
Benoît Combemale, Laurent Broto, Alain Tchan...
COMPSAC
2008
IEEE
14 years 6 months ago
Constraint Reasoning in Path-Oriented Random Testing
Path-oriented Random Testing (PRT) aims at generating a uniformly spread out sequence of random test data that activate a single control flow path within an imperative program. T...
Arnaud Gotlieb, Matthieu Petit
COMPSAC
2008
IEEE
14 years 6 months ago
Behavioral Dependency Measurement for Change-Proneness Prediction in UML 2.0 Design Models
During the development and maintenance of ObjectOriented (OO) software, the information on the classes which are more prone to be changed is very useful. Developers and maintainer...
Ah-Rim Han, Sang-Uk Jeon, Doo-Hwan Bae, Jang-Eui H...
COMPSAC
2008
IEEE
14 years 6 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu