Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | |
Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![IEEE Computer Society, 978-0-7695-4453-3 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Ennan Zhai, Liping Ding, Sihan Qing |
Towards a Reliable Spam-Proof Tagging System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 174-181, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mahmuda Asrafi, Huai Liu, Fei-Ching Kuo |
On Testing Effectiveness of Metamorphic Relations: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 147-156, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jianwen Xiang, Kazuo Yanoo, Yoshiharu Maeno, Kumiko Tadano |
Automatic Synthesis of Static Fault Trees from System Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 127-136, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Seok-Won Lee |
Probabilistic Risk Assessment for Security Requirements: A Preliminary Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 11-20, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jong-Phil Kim, Jang-Eui Hong |
Dynamic Service Replacement to Improve Composite Service Reliability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 182-188, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Flora Amato, Massimo Felici, Paola Lanzi, Giulia Lotti, Luca Save, Alessandra Tedeschi |
Trust Observations in Validation Exercises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 216-223, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Selim Ciraci, Hasan Sözer, Mehmet Aksit, Wilke Havinga |
Execution Constraint Verification of Exception Handling on UML Sequence Diagrams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 31-40, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael Eonsuk Shin, Snehadeep Sethia, Nipul Patel |
Component-Based Malicious Software Engineer Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 21-30, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Andy Restrepo, W. Eric Wong |
Validation of SDL-Based Architectural Design Models: New Coverage Criteria. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 51-59, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tugkan Tuglular, Gurcan Gercek |
Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 157-164, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Hamdaqa, Ladan Tahvildari |
ReLACK: A Reliable VoIP Steganography Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 189-197, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lirong Dai, Yan Bai |
An Organization-Driven Approach for Enterprise Security Development and Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 208-215, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mirco Kuhlmann, Karsten Sohr, Martin Gogolla |
Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 108-117, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park, Suntae Kim |
A Feature-Based Modeling Approach for Building Hybrid Access Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 88-97, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shih-Chien Chou |
Using Partial Ordered Numbers to Control Information Flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 60-69, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bing-Han Li, Shiuhpyng Shieh |
RELEASE: Generating Exploits Using Loop-Aware Concolic Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 165-173, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Omar el Ariss, Jianfei Wu, Dianxiang Xu |
Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 1-10, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | JingZheng Wu, Liping Ding, Yongji Wang 0002, Wei Han |
A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 98-107, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | W. Eric Wong, Andrea Demel, Vidroha Debroy, Michael F. Siok |
Safe Software: Does It Cost More to Develop? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 198-207, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Arjan J. de Roo, Hasan Sözer, Mehmet Aksit |
Runtime Verification of Domain-Specific Models of Physical Characteristics in Control Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 41-50, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Changzhi Zhao, Wei Dong 0006, Martin Leucker, Zhichang Qi |
Security Goals Assurance Based on Software Active Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 70-79, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | HyeonJeong Kim, Doo-Hwan Bae, Vidroha Debroy, W. Eric Wong |
Deriving Data Dependence from/for UML State Machine Diagrams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 118-126, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Aida Omerovic, Bjørnar Solhaug, Ketil Stølen |
Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 137-146, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ki-Seong Lee, Chan-Gun Lee |
Model-Driven Monitoring of Time-Critical Systems Based on Aspect-Oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea, pp. 80-87, 2011, IEEE Computer Society, 978-0-7695-4453-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuzhang Feng, Yang Liu 0003, Yuan-Fang Li, Daqing Zhang 0001 |
Discovering Anomalies in Semantic Web Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 33-42, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Semantic Web, Logic Programming |
1 | Rui Peng, Q. P. Hu, Szu Hui Ng, Min Xie 0001 |
Testing Effort Dependent Software FDP and FCP Models with Consideration of Imperfect Debugging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 141-146, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Imperfect debugging, software reliability, testing effort |
1 | Christof J. Budnik, Rajesh Subramanyan, Raj Tanikella |
Scalable V&V Effort Estimation for Ultra-Large-Scale Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 60-68, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Verification & Validation, Effort Estimation |
1 | Jinxia An, Jihong Zhu 0001 |
Software Reliability Modeling with Integrated Test Coverage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 106-112, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
integrated test coverage, modeling, classification, software reliability, test coverage, test effectiveness |
1 | W. Eric Wong, Vidroha Debroy, Adithya Surampudi, HyeonJeong Kim, Michael F. Siok |
Recent Catastrophic Accidents: Investigating How Software was Responsible. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 14-22, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
catastrophic accidents, mishaps, safety-critical software systems, Software safety |
1 | Xiangyu Luo, Yun Wang |
Recoverability of Erasure Codes Based and Intensively Written Storage Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 173-179, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
mutable storage system, partial update, consistency, erasure-codes, Recoverability |
1 | Odair Jacinto da Silva, Adalberto Nobiato Crespo, Marcos Lordello Chaim, Mário Jino |
Sensitivity of Two Coverage-Based Software Reliability Models to Variations in the Operational Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 113-120, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
software test, software reliability, test coverage, operational profile, testing criteria |
1 | Jim Woodcock 0001, Marcel Oliveira, Alan Burns 0001, Kun Wei |
Modelling and Implementing Complex Systems with Timebands. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 1-13, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hossain Shahriar, Mohammad Zulkernine |
PhishTester: Automatic Testing of Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 198-207, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
application behavior model, heuristic coveage, finite state machine, Phishing, cross site scripting |
1 | Xian Zhang, Yang Liu 0003, Mikhail Auguston |
Modeling and Analyzing Timed Security Protocols Using Extended Timed CSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 217-226, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Constraint Logic Programm, verifictaion, Security Protocol, extension, Timed CSP |
1 | Kenji Taguchi 0001, Nobukazu Yoshioka, Takayuki Tobita, Hiroyuki Kaneko |
Aligning Security Requirements and Security Assurance Using the Common Criteria. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 69-77, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, requirements, assurance, Common Criteria |
1 | Anh Tuan Luu, Man Chun Zheng, Thanh Tho Quan |
Modeling and Verification of Safety Critical Systems: A Case Study on Pacemaker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 23-32, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
PAT, model checking, verification, Pacemaker |
1 | Junhua Ding, Tong Wu, Jun Q. Lu, Xin-Hua Hu |
Self-Checked Metamorphic Testing of an Image Processing Program. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 190-197, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
test coverage criteria, image processing, structural testing, metamorphic testing |
1 | Kun Tian, Kendra M. L. Cooper, Kang Zhang 0001, Siyuan Liu |
Towards a New Understanding of Advice Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 180-189, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Advice Interference, Aspect Oriented Programming, Aspect Interference |
1 | Shao Jie Zhang, Yang Liu 0003 |
Model Checking a Lazy Concurrent List-Based Set Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 43-52, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Concurrent List-Based Set Algorithm, PAT, Linearizability, Refinement Checking |
1 | Thein Than Tun, Yijun Yu, Charles B. Haley, Bashar Nuseibeh |
Model-Based Argument Analysis for Evolving Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 88-97, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Security argumentation, OpenPF, Requirements Engineering, Evolution, Event Calculus |
1 | Shaoying Liu, Shin Nakajima 0001 |
A Decompositional Approach to Automatic Test Case Generation Based on Formal Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 147-155, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Formal specification, Specification-based testing, Automatic test case generation |
1 | Jing Cao, Albert Nymeyer |
The 'Best' Valid Safe Protocol Converter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 237-243, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
protocol converter, verification, component reuse, SoC design |
1 | Fevzi Belli, Axel Hollmann, W. Eric Wong |
Towards Scalable Robustness Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 208-216, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
elementary modification operators, decision tables, robustness testing, event sequence graphs |
1 | Zhen Ming Jiang, Alberto Avritzer, Emad Shihab, Ahmed E. Hassan, Parminder Flora |
An Industrial Case Study on Speeding Up User Acceptance Testing by Mining Execution Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 131-140, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Execution logs, Mining Repositories, Reliability |
1 | Dae-Yeob Kim, Cheong Youn |
Traceability Enhancement Technique through the Integration of Software Configuration Management and Individual Working Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 163-172, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
cooperative management, traceability, version control, software configuration management, workspace |
1 | Moussa Ouedraogo, Haralambos Mouratidis, Djamel Khadraoui, Eric Dubois 0001 |
An Agent-Based System to Support Assurance of Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 78-87, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Security assurance, Secure Tropos, multi-agents systems, Security requirements, security verification |
1 | Fevzi Belli, Mutlu Beyazit |
A Formal Framework for Mutation Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 121-130, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
(model-based) mutation testing, formal/regular grammar, manipulation operator, test generation, directed graph, test coverage |
1 | May Tar Hla Myint, Thandar Thein |
Availability Improvement in Virtualized Multiple Servers with Software Rejuvenation and Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 156-162, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Atef Mohamed, Mohammad Zulkernine |
Failure Type-Aware Reliability Assessment with Component Failure Dependency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 98-105, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
component failure dependency, multi-mode failure, fault tolerance, reliability assessment, Component-based software systems |
1 | Fazle Rabbi 0001, Hao Wang 0003, Wendy MacCaull |
YAWL2DVE: An Automated Translator for Workflow Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 53-59, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
model checking, formal verification, workflow management, YAWL |
1 | |
Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![IEEE Computer Society, 978-0-7695-4086-3 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Senthil Kumar Chandran, Aleksandar Dimov, Sasikumar Punnekkat |
Modeling Uncertainties in the Estimation of Software Reliability . ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010, pp. 227-236, 2010, IEEE Computer Society, 978-0-7695-4086-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner |
Java Card Performance Optimization of Secure Transaction Atomicity Based on Increasing the Class Field Locality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 342-347, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Anti-Tearing, Transaction Mechanism, Java Annotations, Java Card |
1 | Uttiya Basu |
Position Statement: Evolving Software Models for Global Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 320, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Aida Omerovic, Ketil Stølen |
Simplifying Parametrization of Bayesian Networks in Prediction of System Quality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 447-448, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Prasad Bokil, Priyanka Darke, Ulka Shrotri, R. Venkatesh 0001 |
Automatic Test Data Generation for C Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 359-368, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Modified Condition/Decision coverage (MCDC), Automatic Test data generation |
1 | Bhavani Thuraisingham |
Security Engineering: Developments and Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 2-3, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Binbin Qu, Yin Huang, Xiaodong Xie, Yansheng Lu |
A Developed Dynamic Environment Fault Injection Tool for Component Security Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 417-422, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | David Kammler, Junqing Guan, Gerd Ascheid, Rainer Leupers, Heinrich Meyr |
A Fast and Flexible Platform for Fault Injection and Evaluation in Verilog-Based Simulations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 309-314, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Marcin Barylski, Henryk Krawczyk |
Multidimensional Approach to Quality Analysis of IPSec and HTTPS Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 425-430, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hichem Boudali, Hasan Sözer, Mariëlle Stoelinga |
Architectural Availability Analysis of Software Decomposition for Local Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 14-22, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Haibo Yu 0001, Tsunenori Mine, Makoto Amamiya |
Semantic ACP2P Information Retrieval Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 303-308, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Information Retrieval, Multi-agent System, Peer-to-Peer, Semantic Desktop |
1 | Pradeep Varma |
Anchored Text for Software Weaving and Merging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 93-100, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
software weaving, multi-dimensional separation of concerns (MDSOC), simultaneous concerns, highly-concurrent, porting concerns, refactoring, atomic registers, anchored text, software merging |
1 | Ying Jiang, Ying-Na Li, Shan-Shan Hou, Lu Zhang 0023 |
Test-Data Generation for Web Services Based on Contract Mutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 281-286, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Contract Mutation, Web Services, Test-Data Generation |
1 | Rudolf Siebenhofer |
Complexity - Interoperability - Deployment of Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 6, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Q. Hankins, Tetsutaro Uehara, Jigang Liu |
A Comparative Study of Forensic Science and Computer Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 230-239, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Forensic Science, Computer Forensics, Comparative Study |
1 | Xinhuai Tang, Sizhe Sun, Xiaozhou Yuan, Delai Chen |
Automated Web Service Composition System on Enterprise Service Bus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 9-13, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Fuyuan Zhang, Zhengwei Qi, Haibing Guan, Xuezheng Liu, Mao Yang, Zheng Zhang 0001 |
FiLM: A Runtime Monitoring Tool for Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 40-46, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
distributed systems, finite automata, runtime monitoring, LTL |
1 | Ryan Q. Hankins, Tetsutaro Uehara, Jigang Liu |
A Turing Machine-Based Model for Computer Forensic Reconstruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 289-290, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jeff Offutt |
Automatic Test Data Generation : Who, When and Where ?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 4, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Frances Paulisch |
Reliability for Software-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 5, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jin-Cherng Lin, Jan-Min Chen, Chou-Chuan Chen, Yu-Shu Chien |
A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 75-81, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Minimax Theorem, Game Theory, Network Security |
1 | Pejman Salehi, Ferhat Khendek, Maria Toeroe, Abdelwahab Hamou-Lhadj, Abdelouahed Gherbi |
Checking Service Instance Protection for AMF Configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 269-274, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Availability Management Framework, Service Instance Protection, Complexity, Validation, Configurations |
1 | Lirong Dai |
Security Variability Design and Analysis in an Aspect Oriented Software Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 275-280, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security variability design and analysis, software architecture, aspect oriented |
1 | Chunxiang Xu, Hanpin Wang, Wanling Qu, Meixia Zhu, Yu Huang 0004 |
A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination Semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 203-211, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jing Du 0001, Ye Yang, Qing Wang 0001 |
An Analysis for Understanding Software Security Requirement Methodologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 141-149, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Requirement Methodology, Literature Review and Analysis, Software, Security Requirement |
1 | Ming-Jheng Li, Ying-Hsuan Chang, Justie Su-tzu Juan |
Efficient Multi-secret Sharing Scheme Using Room Square. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 260-266, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
room square, multi-use, multi-secret, secret sharing scheme |
1 | Jifeng He 0001 |
Probabilistic Programming With Coordination and Compensation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 1, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xucheng Tang, Beijun Shen |
Extending Model Driven Architecture with Software Security Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 436-441, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Software Security Assessment, Model-driven Architecture |
1 | Bao Tang |
Panel: Increase Industry and Academy Cooperation in Testing Technologies and Tools for Critical Industry Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 376, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Madhu Kilari, Qiyu Huang, Tongdan Jin |
Six-Sigma Based Performance Verification in Early Development of Automatic Test Equipment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 187-192, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Design for Six-Sigma, Measurement Uncertainty, Performance Verification |
1 | Jueliang Hu, Zuohua Ding, Geguang Pu |
Path-Based Approach to Integration Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 445-446, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Program Slicing, Integration Testing, Path Analysis |
1 | Lili Diao, Hao Wang 0013 |
A Safe Approach to Shrink Email Sample Set while Keeping Balance between Spam and Normal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 329-334, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anti-spam, machine learning, SVM |
1 | Tugkan Tuglular, Özgür Kaya, Can Arda Muftuoglu, Fevzi Belli |
Directed Acyclic Graph Modeling of Security Policies for Firewall Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 393-398, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Firewall Policies, Firewall Testing, Firewalls, Directed Acyclic Graphs, Security Testing, Event Sequence Graphs |
1 | JeeHyun Hwang, Tao Xie 0001, Vincent C. Hu |
Detection of Multiple-Duty-Related Security Leakage in Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 65-74, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Validation, Access Control Policies, Policy Verification |
1 | Chao Xu, Jinghui Gu, Ling Lin, Alei Liang, Haibing Guan |
CacheBit: A Multisource-Multitarget Cache Instrumentation Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 35-39, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cahce simulating, instrumentation, dynamic binary translation |
1 | Ching-Fan Lee, Justie Su-tzu Juan |
An Efficient and Secure Multi-secret Image Sharing Scheme with General Access Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 253-259, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
(t, n)-threshold secret sharing scheme, multi-secret, multi-use, general access structure, share |
1 | Mao Boying |
Position Statement: Evolving Software Models for Global Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 318-319, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rudolf Siebenhofer |
Systematic Cooperation between Industry and Universities . ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 324, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Zhang, Yuan Luo 0003, Chuliang Weng, Minglu Li 0001 |
A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 59-64, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Profile Injection Attacks, Trust, Recommender Systems |
1 | Anmin Xie, Guodong Chen, Yonggang Wang, Zhong Chen 0001, Jian-bin Hu |
A New Method to Generate Attack Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 401-406, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
host access graph, sub-attack graph, network security, attack graphs |
1 | Kun Tian, Kendra M. L. Cooper, Kang Zhang 0001, Huiqun Yu |
A Classification of Aspect Composition Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 101-109, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
aspect composition problems, aspect conflicts, aspect interference |
1 | |
Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![IEEE Computer Society, 978-0-7695-3758-0 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Rajesh Subramanyan |
Panel Description: Evolving Software Models for Global Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 317, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Basso, Alexander Bolotov, Vladimir Getov |
Temporal Specification and Deductive Verification of a Distributed Component Model and Its Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 379-386, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Grid Component Model, Grid IDE, Automated Reconfiguration, Formal Specification, Deductive Reasoning |
1 | Sathish Pinagapani, Dianxiang Xu, Jun Kong |
A Comparative Study of Access Control Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 407-412, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
JAAS, authentication, access control, software metrics, authorization, XACML, ACL |
1 | Lingyun Ying, Purui Su, Dengguo Feng, Xianggen Wang, Yi Yang 0040, Yu Liu |
ReconBin: Reconstructing Binary File from Execution for Software Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 222-229, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
software security analysis, binary analysis, execution monitoring, malware analysis |
1 | Yong Li, Yu Zhang 0086, Yiyun Chen, Ming Fu |
On the Verification of Strong Atomicity in Programs Using STM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 123-131, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
transactional memory, proof-carrying code, strong atomicity |
1 | Ajit Srividya, Kovur Krishna Mohan, Ajit Kumar Verma |
Improvement of QoS in Process Centric Software Development Using ANP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 451-452, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Quality of service, Software Development, Rational Unified Process, Analytical Network Process |