-
1
-
-
0030419725
-
A domain and type enforcement UNIX prototype
-
Lee Badger, Daniel F. Sterne, David L. Sherman, and Kenneth M. Walker. A domain and type enforcement UNIX prototype. USENIX Computing Systems, 9(1):47–83, 1996.
-
(1996)
USENIX Computing Systems
, vol.9
, Issue.1
, pp. 47-83
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
-
5
-
-
17044393092
-
Visual Requirements Validation: Case Study in a Corba-supported environment
-
Essen, Germany, page to appear, September
-
Pascal Fenkam, Harald Gall, and Mehdi Jazayeri. Visual Requirements Validation: Case Study in a Corba-supported environment. In Proceedings of the 10th IEEE Joint International RequirementsEngineering Conference, Essen, Germany, page to appear, September 2002.
-
(2002)
Proceedings of the 10Th IEEE Joint International Requirementsengineering Conference
-
-
Fenkam, P.1
Gall, H.2
Jazayeri, M.3
-
6
-
-
0141913085
-
-
Master’s thesis, Graz University of Technology and Vienna University of Technology, September
-
Pascal Christian Fenkam. Dynamic user management system for web sites. Master’s thesis, Graz University of Technology and Vienna University of Technology, September 2000. Available from http//www.ist.tu-graz.ac.at/publications.
-
(2000)
Dynamic User Management System for Web Sites
-
-
Fenkam, P.C.1
-
7
-
-
0036145519
-
Building software component from the ground up
-
January
-
Anup K Ghosh. Building software component from the ground up. IEEE Software, 19(1):14–16, January 2002.
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 14-16
-
-
Ghosh, A.K.1
-
8
-
-
84944107702
-
-
GMD. Xql ipsi
-
GMD. Xql ipsi, http://xml.darmstadt.gmd.de/xql/, 2002.
-
(2002)
-
-
-
9
-
-
0036149234
-
Correctness by construction: Developing a commercial secure system
-
February
-
Anthony Hall and Roderick Chapman. Correctness by construction: Developing a commercial secure system. IEEE Software, pages 18–25, February 2002.
-
(2002)
IEEE Software
, pp. 18-25
-
-
Hall, A.1
Chapman, R.2
-
12
-
-
35248856129
-
-
Technical report, MIT Laboratory for Computer Sciences, Software Design Group, Unpublished Manuscript
-
Daniel Jackson. Automatic analysis of architectural styles. Technical report, MIT Laboratory for Computer Sciences, Software Design Group, Unpublished Manuscript. Available at http://sdg.lcs.mit.edu/ dnj/publications.html.
-
Automatic Analysis of Architectural Styles
-
-
Jackson, D.1
-
14
-
-
84944107703
-
A service architecture for mobile teamwork
-
ITALY, July
-
Engin Kirda, Pascal Fenkam, Gerald Reif, and Harald Gall. A service architecture for mobile teamwork. In Proceedings of the 14th International Conference on Software Engineering Conference and Knowledge Engineering Ischia, ITALY, July 2002.
-
(2002)
Proceedings of the 14Th International Conference on Software Engineering Conference and Knowledge Engineering Ischia
-
-
Kirda, E.1
Fenkam, P.2
Reif, G.3
Gall, H.4
-
15
-
-
84969377247
-
User Authentication and Authorization in The Java Platform
-
Phoenix, AZ, December
-
Charlie Lai, Li Gong, larry Koved, Anthony Nadalin, and Roland Schemers. User Authentication and Authorization in The Java Platform. In Proceedings of the 15thA nnual Computer Security Conference, Phoenix, AZ, December 1999.
-
(1999)
Proceedings of the 15Tha Nnual Computer Security Conference
-
-
Lai, C.1
Li, G.2
Koved, L.3
Nadalin, A.4
Schemers, R.5
-
17
-
-
14244270308
-
Penetrate and patch is bad
-
February
-
Gary McGraw. Penetrate and patch is bad. IEEE Software, pages 15–16, February 2002.
-
(2002)
IEEE Software
, pp. 15-16
-
-
McGraw, G.1
-
20
-
-
84976809888
-
An Overview of the ISO/VDM-SL Standard
-
ACM SIGPLAN, September
-
Nico Plat and Peter Gorm Larsen. An Overview of the ISO/VDM-SL Standard. In ACM SIGPLAN Notices. ACM SIGPLAN, September 1992.
-
(1992)
ACM SIGPLAN Notices
-
-
Plat, N.1
Larsen, P.G.2
-
21
-
-
84950255921
-
A web-based peer-to-peer architecture for collaborative nomadic working
-
Boston, MA, USA. IEEE Computer Society Press, June
-
Gerald Reif, Engin Kirda, Harald Gall, Gian Pietro Picco, Gianpaola Cugola, and Pascal Fenkam. A web-based peer-to-peer architecture for collaborative nomadic working. In 10th IEEE Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), Boston, MA, USA. IEEE Computer Society Press, June 2001.
-
(2001)
10Th IEEE Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE)
-
-
Reif, G.1
Kirda, E.2
Gall, H.3
Picco, G.P.4
Cugola, G.5
Fenkam, P.6
-
23
-
-
67650528244
-
-
Technical report, Sun Microsystem, February
-
Sun Microsystem. Security code guidelines. Technical report, Sun Microsystem, February 2000. Available at http://java.sun.com/security/seccodeguide.html.
-
(2000)
Security Code Guidelines
-
-
Microsystem, S.1
-
24
-
-
84944070335
-
-
The Institute of Applied Computer Science, IFAD, IFAD Danemark
-
The Institute of Applied Computer Science, IFAD. The IFAD VDM Toolbox. IFAD Danemark, 1999. Available from www.ifad.dk.
-
(1999)
The IFAD VDM Toolbox
-
-
-
25
-
-
84944107707
-
-
The Open Group, Guide to Security Patterns, Draft 1. The Open Group, April
-
The Open Group. Guide to Security Patterns, Draft 1. The Open Group, April 2002. Available at www.opengroup.org.
-
(2002)
-
-
|