Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | |
Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea |
SSIRI |
2011 |
DBLP BibTeX RDF |
|
1 | Ennan Zhai, Liping Ding, Sihan Qing |
Towards a Reliable Spam-Proof Tagging System. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mahmuda Asrafi, Huai Liu, Fei-Ching Kuo |
On Testing Effectiveness of Metamorphic Relations: A Case Study. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jianwen Xiang, Kazuo Yanoo, Yoshiharu Maeno, Kumiko Tadano |
Automatic Synthesis of Static Fault Trees from System Models. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Seok-Won Lee |
Probabilistic Risk Assessment for Security Requirements: A Preliminary Study. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jong-Phil Kim, Jang-Eui Hong |
Dynamic Service Replacement to Improve Composite Service Reliability. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Flora Amato, Massimo Felici, Paola Lanzi, Giulia Lotti, Luca Save, Alessandra Tedeschi |
Trust Observations in Validation Exercises. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Selim Ciraci, Hasan Sözer, Mehmet Aksit, Wilke Havinga |
Execution Constraint Verification of Exception Handling on UML Sequence Diagrams. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael Eonsuk Shin, Snehadeep Sethia, Nipul Patel |
Component-Based Malicious Software Engineer Intrusion Detection. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Andy Restrepo, W. Eric Wong |
Validation of SDL-Based Architectural Design Models: New Coverage Criteria. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tugkan Tuglular, Gurcan Gercek |
Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Hamdaqa, Ladan Tahvildari |
ReLACK: A Reliable VoIP Steganography Approach. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lirong Dai, Yan Bai |
An Organization-Driven Approach for Enterprise Security Development and Management. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mirco Kuhlmann, Karsten Sohr, Martin Gogolla |
Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park, Suntae Kim |
A Feature-Based Modeling Approach for Building Hybrid Access Control Systems. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shih-Chien Chou |
Using Partial Ordered Numbers to Control Information Flows. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bing-Han Li, Shiuhpyng Shieh |
RELEASE: Generating Exploits Using Loop-Aware Concolic Execution. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Omar el Ariss, Jianfei Wu, Dianxiang Xu |
Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | JingZheng Wu, Liping Ding, Yongji Wang 0002, Wei Han |
A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | W. Eric Wong, Andrea Demel, Vidroha Debroy, Michael F. Siok |
Safe Software: Does It Cost More to Develop? |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Arjan J. de Roo, Hasan Sözer, Mehmet Aksit |
Runtime Verification of Domain-Specific Models of Physical Characteristics in Control Software. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Changzhi Zhao, Wei Dong 0006, Martin Leucker, Zhichang Qi |
Security Goals Assurance Based on Software Active Monitoring. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | HyeonJeong Kim, Doo-Hwan Bae, Vidroha Debroy, W. Eric Wong |
Deriving Data Dependence from/for UML State Machine Diagrams. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Aida Omerovic, Bjørnar Solhaug, Ketil Stølen |
Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ki-Seong Lee, Chan-Gun Lee |
Model-Driven Monitoring of Time-Critical Systems Based on Aspect-Oriented Programming. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuzhang Feng, Yang Liu 0003, Yuan-Fang Li, Daqing Zhang 0001 |
Discovering Anomalies in Semantic Web Rules. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
Semantic Web, Logic Programming |
1 | Rui Peng, Q. P. Hu, Szu Hui Ng, Min Xie 0001 |
Testing Effort Dependent Software FDP and FCP Models with Consideration of Imperfect Debugging. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
Imperfect debugging, software reliability, testing effort |
1 | Christof J. Budnik, Rajesh Subramanyan, Raj Tanikella |
Scalable V&V Effort Estimation for Ultra-Large-Scale Systems. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
Verification & Validation, Effort Estimation |
1 | Jinxia An, Jihong Zhu 0001 |
Software Reliability Modeling with Integrated Test Coverage. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
integrated test coverage, modeling, classification, software reliability, test coverage, test effectiveness |
1 | W. Eric Wong, Vidroha Debroy, Adithya Surampudi, HyeonJeong Kim, Michael F. Siok |
Recent Catastrophic Accidents: Investigating How Software was Responsible. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
catastrophic accidents, mishaps, safety-critical software systems, Software safety |
1 | Xiangyu Luo, Yun Wang |
Recoverability of Erasure Codes Based and Intensively Written Storage Systems. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
mutable storage system, partial update, consistency, erasure-codes, Recoverability |
1 | Odair Jacinto da Silva, Adalberto Nobiato Crespo, Marcos Lordello Chaim, Mário Jino |
Sensitivity of Two Coverage-Based Software Reliability Models to Variations in the Operational Profile. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
software test, software reliability, test coverage, operational profile, testing criteria |
1 | Jim Woodcock 0001, Marcel Oliveira, Alan Burns 0001, Kun Wei |
Modelling and Implementing Complex Systems with Timebands. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hossain Shahriar, Mohammad Zulkernine |
PhishTester: Automatic Testing of Phishing Attacks. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
application behavior model, heuristic coveage, finite state machine, Phishing, cross site scripting |
1 | Xian Zhang, Yang Liu 0003, Mikhail Auguston |
Modeling and Analyzing Timed Security Protocols Using Extended Timed CSP. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
Constraint Logic Programm, verifictaion, Security Protocol, extension, Timed CSP |
1 | Kenji Taguchi 0001, Nobukazu Yoshioka, Takayuki Tobita, Hiroyuki Kaneko |
Aligning Security Requirements and Security Assurance Using the Common Criteria. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
security, requirements, assurance, Common Criteria |
1 | Anh Tuan Luu, Man Chun Zheng, Thanh Tho Quan |
Modeling and Verification of Safety Critical Systems: A Case Study on Pacemaker. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
PAT, model checking, verification, Pacemaker |
1 | Junhua Ding, Tong Wu, Jun Q. Lu, Xin-Hua Hu |
Self-Checked Metamorphic Testing of an Image Processing Program. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
test coverage criteria, image processing, structural testing, metamorphic testing |
1 | Kun Tian, Kendra M. L. Cooper, Kang Zhang 0001, Siyuan Liu |
Towards a New Understanding of Advice Interference. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
Advice Interference, Aspect Oriented Programming, Aspect Interference |
1 | Shao Jie Zhang, Yang Liu 0003 |
Model Checking a Lazy Concurrent List-Based Set Algorithm. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
Concurrent List-Based Set Algorithm, PAT, Linearizability, Refinement Checking |
1 | Thein Than Tun, Yijun Yu, Charles B. Haley, Bashar Nuseibeh |
Model-Based Argument Analysis for Evolving Security Requirements. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
Security argumentation, OpenPF, Requirements Engineering, Evolution, Event Calculus |
1 | Shaoying Liu, Shin Nakajima 0001 |
A Decompositional Approach to Automatic Test Case Generation Based on Formal Specifications. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
Formal specification, Specification-based testing, Automatic test case generation |
1 | Jing Cao, Albert Nymeyer |
The 'Best' Valid Safe Protocol Converter. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
protocol converter, verification, component reuse, SoC design |
1 | Fevzi Belli, Axel Hollmann, W. Eric Wong |
Towards Scalable Robustness Testing. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
elementary modification operators, decision tables, robustness testing, event sequence graphs |
1 | Zhen Ming Jiang, Alberto Avritzer, Emad Shihab, Ahmed E. Hassan, Parminder Flora |
An Industrial Case Study on Speeding Up User Acceptance Testing by Mining Execution Logs. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
Execution logs, Mining Repositories, Reliability |
1 | Dae-Yeob Kim, Cheong Youn |
Traceability Enhancement Technique through the Integration of Software Configuration Management and Individual Working Environment. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
cooperative management, traceability, version control, software configuration management, workspace |
1 | Moussa Ouedraogo, Haralambos Mouratidis, Djamel Khadraoui, Eric Dubois 0001 |
An Agent-Based System to Support Assurance of Security Requirements. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
Security assurance, Secure Tropos, multi-agents systems, Security requirements, security verification |
1 | Fevzi Belli, Mutlu Beyazit |
A Formal Framework for Mutation Testing. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
(model-based) mutation testing, formal/regular grammar, manipulation operator, test generation, directed graph, test coverage |
1 | May Tar Hla Myint, Thandar Thein |
Availability Improvement in Virtualized Multiple Servers with Software Rejuvenation and Virtualization. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Atef Mohamed, Mohammad Zulkernine |
Failure Type-Aware Reliability Assessment with Component Failure Dependency. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
component failure dependency, multi-mode failure, fault tolerance, reliability assessment, Component-based software systems |
1 | Fazle Rabbi 0001, Hao Wang 0003, Wendy MacCaull |
YAWL2DVE: An Automated Translator for Workflow Verification. |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
model checking, formal verification, workflow management, YAWL |
1 | |
Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010 |
SSIRI |
2010 |
DBLP BibTeX RDF |
|
1 | Senthil Kumar Chandran, Aleksandar Dimov, Sasikumar Punnekkat |
Modeling Uncertainties in the Estimation of Software Reliability . |
SSIRI |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner |
Java Card Performance Optimization of Secure Transaction Atomicity Based on Increasing the Class Field Locality. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Anti-Tearing, Transaction Mechanism, Java Annotations, Java Card |
1 | Uttiya Basu |
Position Statement: Evolving Software Models for Global Organizations. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Aida Omerovic, Ketil Stølen |
Simplifying Parametrization of Bayesian Networks in Prediction of System Quality. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Prasad Bokil, Priyanka Darke, Ulka Shrotri, R. Venkatesh 0001 |
Automatic Test Data Generation for C Programs. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Modified Condition/Decision coverage (MCDC), Automatic Test data generation |
1 | Bhavani Thuraisingham |
Security Engineering: Developments and Directions. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Binbin Qu, Yin Huang, Xiaodong Xie, Yansheng Lu |
A Developed Dynamic Environment Fault Injection Tool for Component Security Testing. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | David Kammler, Junqing Guan, Gerd Ascheid, Rainer Leupers, Heinrich Meyr |
A Fast and Flexible Platform for Fault Injection and Evaluation in Verilog-Based Simulations. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Marcin Barylski, Henryk Krawczyk |
Multidimensional Approach to Quality Analysis of IPSec and HTTPS Applications. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hichem Boudali, Hasan Sözer, Mariëlle Stoelinga |
Architectural Availability Analysis of Software Decomposition for Local Recovery. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Haibo Yu 0001, Tsunenori Mine, Makoto Amamiya |
Semantic ACP2P Information Retrieval Method. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Information Retrieval, Multi-agent System, Peer-to-Peer, Semantic Desktop |
1 | Pradeep Varma |
Anchored Text for Software Weaving and Merging. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
software weaving, multi-dimensional separation of concerns (MDSOC), simultaneous concerns, highly-concurrent, porting concerns, refactoring, atomic registers, anchored text, software merging |
1 | Ying Jiang, Ying-Na Li, Shan-Shan Hou, Lu Zhang 0023 |
Test-Data Generation for Web Services Based on Contract Mutation. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Contract Mutation, Web Services, Test-Data Generation |
1 | Rudolf Siebenhofer |
Complexity - Interoperability - Deployment of Software. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Q. Hankins, Tetsutaro Uehara, Jigang Liu |
A Comparative Study of Forensic Science and Computer Forensics. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Forensic Science, Computer Forensics, Comparative Study |
1 | Xinhuai Tang, Sizhe Sun, Xiaozhou Yuan, Delai Chen |
Automated Web Service Composition System on Enterprise Service Bus. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Fuyuan Zhang, Zhengwei Qi, Haibing Guan, Xuezheng Liu, Mao Yang, Zheng Zhang 0001 |
FiLM: A Runtime Monitoring Tool for Distributed Systems. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
distributed systems, finite automata, runtime monitoring, LTL |
1 | Ryan Q. Hankins, Tetsutaro Uehara, Jigang Liu |
A Turing Machine-Based Model for Computer Forensic Reconstruction. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jeff Offutt |
Automatic Test Data Generation : Who, When and Where ?. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Frances Paulisch |
Reliability for Software-Based Systems. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jin-Cherng Lin, Jan-Min Chen, Chou-Chuan Chen, Yu-Shu Chien |
A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Minimax Theorem, Game Theory, Network Security |
1 | Pejman Salehi, Ferhat Khendek, Maria Toeroe, Abdelwahab Hamou-Lhadj, Abdelouahed Gherbi |
Checking Service Instance Protection for AMF Configurations. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Availability Management Framework, Service Instance Protection, Complexity, Validation, Configurations |
1 | Lirong Dai |
Security Variability Design and Analysis in an Aspect Oriented Software Architecture. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
security variability design and analysis, software architecture, aspect oriented |
1 | Chunxiang Xu, Hanpin Wang, Wanling Qu, Meixia Zhu, Yu Huang 0004 |
A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination Semantics. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jing Du 0001, Ye Yang, Qing Wang 0001 |
An Analysis for Understanding Software Security Requirement Methodologies. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Requirement Methodology, Literature Review and Analysis, Software, Security Requirement |
1 | Ming-Jheng Li, Ying-Hsuan Chang, Justie Su-tzu Juan |
Efficient Multi-secret Sharing Scheme Using Room Square. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
room square, multi-use, multi-secret, secret sharing scheme |
1 | Jifeng He 0001 |
Probabilistic Programming With Coordination and Compensation. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xucheng Tang, Beijun Shen |
Extending Model Driven Architecture with Software Security Assessment. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Software Security Assessment, Model-driven Architecture |
1 | Bao Tang |
Panel: Increase Industry and Academy Cooperation in Testing Technologies and Tools for Critical Industry Applications. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Madhu Kilari, Qiyu Huang, Tongdan Jin |
Six-Sigma Based Performance Verification in Early Development of Automatic Test Equipment. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Design for Six-Sigma, Measurement Uncertainty, Performance Verification |
1 | Jueliang Hu, Zuohua Ding, Geguang Pu |
Path-Based Approach to Integration Testing. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Program Slicing, Integration Testing, Path Analysis |
1 | Lili Diao, Hao Wang 0013 |
A Safe Approach to Shrink Email Sample Set while Keeping Balance between Spam and Normal. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
anti-spam, machine learning, SVM |
1 | Tugkan Tuglular, Özgür Kaya, Can Arda Muftuoglu, Fevzi Belli |
Directed Acyclic Graph Modeling of Security Policies for Firewall Testing. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Firewall Policies, Firewall Testing, Firewalls, Directed Acyclic Graphs, Security Testing, Event Sequence Graphs |
1 | JeeHyun Hwang, Tao Xie 0001, Vincent C. Hu |
Detection of Multiple-Duty-Related Security Leakage in Access Control Policies. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Validation, Access Control Policies, Policy Verification |
1 | Chao Xu, Jinghui Gu, Ling Lin, Alei Liang, Haibing Guan |
CacheBit: A Multisource-Multitarget Cache Instrumentation Tool. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
cahce simulating, instrumentation, dynamic binary translation |
1 | Ching-Fan Lee, Justie Su-tzu Juan |
An Efficient and Secure Multi-secret Image Sharing Scheme with General Access Structure. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
(t, n)-threshold secret sharing scheme, multi-secret, multi-use, general access structure, share |
1 | Mao Boying |
Position Statement: Evolving Software Models for Global Organizations. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rudolf Siebenhofer |
Systematic Cooperation between Industry and Universities . |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Zhang, Yuan Luo 0003, Chuliang Weng, Minglu Li 0001 |
A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Profile Injection Attacks, Trust, Recommender Systems |
1 | Anmin Xie, Guodong Chen, Yonggang Wang, Zhong Chen 0001, Jian-bin Hu |
A New Method to Generate Attack Graphs. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
host access graph, sub-attack graph, network security, attack graphs |
1 | Kun Tian, Kendra M. L. Cooper, Kang Zhang 0001, Huiqun Yu |
A Classification of Aspect Composition Problems. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
aspect composition problems, aspect conflicts, aspect interference |
1 | |
Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009 |
SSIRI |
2009 |
DBLP BibTeX RDF |
|
1 | Rajesh Subramanyan |
Panel Description: Evolving Software Models for Global Organizations. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Basso, Alexander Bolotov, Vladimir Getov |
Temporal Specification and Deductive Verification of a Distributed Component Model and Its Environment. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Grid Component Model, Grid IDE, Automated Reconfiguration, Formal Specification, Deductive Reasoning |
1 | Sathish Pinagapani, Dianxiang Xu, Jun Kong |
A Comparative Study of Access Control Languages. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
JAAS, authentication, access control, software metrics, authorization, XACML, ACL |
1 | Lingyun Ying, Purui Su, Dengguo Feng, Xianggen Wang, Yi Yang 0040, Yu Liu |
ReconBin: Reconstructing Binary File from Execution for Software Analysis. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
software security analysis, binary analysis, execution monitoring, malware analysis |
1 | Yong Li, Yu Zhang 0086, Yiyun Chen, Ming Fu |
On the Verification of Strong Atomicity in Programs Using STM. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
transactional memory, proof-carrying code, strong atomicity |
1 | Ajit Srividya, Kovur Krishna Mohan, Ajit Kumar Verma |
Improvement of QoS in Process Centric Software Development Using ANP. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
Quality of service, Software Development, Rational Unified Process, Analytical Network Process |