메뉴 건너뛰기




Volumn 1, Issue , 2010, Pages 135-144

Liability in software engineering: Overview of the LISE approach and illustration on a case study

Author keywords

contract; defects; evidence; formal methods; legal aspects; liability; specification

Indexed keywords

CONTRACTS; DEFECTS; FORMAL METHODS; SPECIFICATIONS;

EID: 77954740511     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1806799.1806823     Document Type: Conference Paper
Times cited : (8)

References (35)
  • 1
    • 33748570319 scopus 로고    scopus 로고
    • On the relationship of privacy and secure remote logging in dynamic systems
    • SEC, Springer
    • R. Accorsi. On the relationship of privacy and secure remote logging in dynamic systems. In SEC, volume 201 of IFIP, pages 329-339. Springer, 2006.
    • (2006) IFIP , vol.201 , pp. 329-339
    • Accorsi, R.1
  • 10
    • 77954728672 scopus 로고    scopus 로고
    • Rigorous development of automated inconsistency checks for digital evidence using the B method
    • P. Gladyshev and A. Enbacka. Rigorous development of automated inconsistency checks for digital evidence using the B method. International Journal of Digital Evidence (IJDE), 6(2):1-21, 2007.
    • (2007) International Journal of Digital Evidence (IJDE) , vol.6 , Issue.2 , pp. 1-21
    • Gladyshev, P.1    Enbacka, A.2
  • 11
    • 38749096258 scopus 로고    scopus 로고
    • Compliance checking between business processes and business contracts
    • IEEE Computer Society
    • G. Governatori, Z. Milosevic, and S. W. Sadiq. Compliance checking between business processes and business contracts. In EDOC, pages 221-232. IEEE Computer Society, 2006.
    • (2006) EDOC , pp. 221-232
    • Governatori, G.1    Milosevic, Z.2    Sadiq, S.W.3
  • 15
    • 33745641592 scopus 로고    scopus 로고
    • Flexible encoding of mathematics on the computer
    • MKM
    • F. Kamareddine, M. Maarek, and J. B. Wells. Flexible encoding of mathematics on the computer. In MKM, volume 3119 of LNCS, pages 160-174, 2004.
    • (2004) LNCS , vol.3119 , pp. 160-174
    • Kamareddine, F.1    Maarek, M.2    Wells, J.B.3
  • 16
    • 67650682101 scopus 로고    scopus 로고
    • A formal privacy management framework
    • FAST
    • D. Le Métayer. A formal privacy management framework. In FAST, volume 5491 of LNCS, pages 162-176, 2009.
    • (2009) LNCS , vol.5491 , pp. 162-176
    • Le Métayer, D.1
  • 17
    • 77954736143 scopus 로고    scopus 로고
    • Les clauses limitatives de responsabilité et de garantie dans les contrats informatiques. Approche comparative France/États-Unis. Quelles limitations
    • May
    • S. Lipovetsky. Les clauses limitatives de responsabilité et de garantie dans les contrats informatiques. Approche comparative France/États-Unis. Quelles limitations. Expertises des systèmes d'information, no 237, pages 143-148, May 2000.
    • (2000) Expertises des Systèmes d'Information , Issue.237 , pp. 143-148
    • Lipovetsky, S.1
  • 18
    • 84973491099 scopus 로고    scopus 로고
    • Software reliability and dependability: A roadmap
    • ACM
    • B. Littlewood and L. Strigini. Software reliability and dependability: a roadmap. In ICSE - Future of SE Track, pages 175-188, ACM, 2000.
    • (2000) ICSE - Future of SE Track , pp. 175-188
    • Littlewood, B.1    Strigini, L.2
  • 19
    • 0042154177 scopus 로고    scopus 로고
    • Model-based system monitoring and diagnosis of failures using statecharts and fault trees
    • Y. Papadopoulos. Model-based system monitoring and diagnosis of failures using statecharts and fault trees. Reliability Engineering and System Safety, 81:325-341, 2003.
    • (2003) Reliability Engineering and System Safety , vol.81 , pp. 325-341
    • Papadopoulos, Y.1
  • 20
    • 65349177152 scopus 로고    scopus 로고
    • Security benchmarks of OSGi platforms: Toward hardened OSGi
    • P. Parrend and S. Frénot. Security benchmarks of OSGi platforms: toward hardened OSGi. Software - Practice and Experience (SPE), 39(5):471-499, 2009.
    • (2009) Software - Practice and Experience (SPE) , vol.39 , Issue.5 , pp. 471-499
    • Parrend, P.1    Frénot, S.2
  • 22
    • 33750488796 scopus 로고    scopus 로고
    • How to write a financial contract
    • Cornerstones of Computing, chapter 6
    • S. L. Peyton Jones and J.-M. Eber. How to write a financial contract. In The Fun of Programming, Cornerstones of Computing, chapter 6. 2003.
    • (2003) The Fun of Programming
    • Peyton Jones, S.L.1    Eber, J.-M.2
  • 24
    • 37149021163 scopus 로고    scopus 로고
    • A formal language for electronic contracts
    • FMOODS, Springer
    • C. Prisacariu and G. Schneider. A formal language for electronic contracts. In FMOODS, volume 4468 of LNCS, pages 174-189. Springer, 2007.
    • (2007) LNCS , vol.4468 , pp. 174-189
    • Prisacariu, C.1    Schneider, G.2
  • 26
    • 33646162634 scopus 로고    scopus 로고
    • A temporal logic-based model for forensic investigation in networked system security
    • S. Rekhis and N. Boudriga. A temporal logic-based model for forensic investigation in networked system security. Computer Network Security, 3685:325-338, 2005.
    • (2005) Computer Network Security , vol.3685 , pp. 325-338
    • Rekhis, S.1    Boudriga, N.2
  • 27
    • 3042744350 scopus 로고    scopus 로고
    • Two views on security and software liability. Let the legal system decide
    • January-February
    • D. J. Ryan. Two views on security and software liability. Let the legal system decide. IEEE Security and Privacy, January-February, 2003.
    • (2003) IEEE Security and Privacy
    • Ryan, D.J.1
  • 30
    • 4544298452 scopus 로고    scopus 로고
    • Precise service level agreements
    • IEEE
    • J. Skene, D. D. Lamanna, and W. Emmerich. Precise service level agreements. In ICSE, pages 179-188. IEEE, 2004.
    • (2004) ICSE , pp. 179-188
    • Skene, J.1    Lamanna, D.D.2    Emmerich, W.3
  • 32
    • 10644286456 scopus 로고    scopus 로고
    • Preparing evidence for court
    • M. Solon and P. Harper. Preparing evidence for court. Digital Investigation, 1:279-283, 2004.
    • (2004) Digital Investigation , vol.1 , pp. 279-283
    • Solon, M.1    Harper, P.2
  • 33
    • 3042553947 scopus 로고    scopus 로고
    • Modeling of post-incident root cause analysis
    • P. Stephenson. Modeling of post-incident root cause analysis. Digital Evidence, 2(2), 2003.
    • (2003) Digital Evidence , vol.2 , Issue.2
    • Stephenson, P.1
  • 34
    • 70349671532 scopus 로고    scopus 로고
    • The inference validity problem in legal discovery
    • IEEE
    • R. E. K. Stirewalt, L. K. Dillon, and E. Kraemer. The inference validity problem in legal discovery. In ICSE Companion, pages 303-306. IEEE, 2009.
    • (2009) ICSE Companion , pp. 303-306
    • Stirewalt, R.E.K.1    Dillon, L.K.2    Kraemer, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.