Security characterisation of software components and their composition
暂无分享,去创建一个
[1] Bertrand Meyer,et al. Applying 'design by contract' , 1992, Computer.
[2] Jean-Marc Jézéquel,et al. Making Components Contract Aware , 1999, Computer.
[3] Erland Jonsson,et al. A Map of Security Risks Associated wuth Using COTS , 1998, Computer.
[4] MeyerBertrand,et al. Design by Contract , 1997 .
[5] Jun Han. A comprehensive interface definition framework for software components , 1998, Proceedings 1998 Asia Pacific Software Engineering Conference (Cat. No.98EX240).
[6] Desmond D'Souza,et al. Objects, Components, and Frameworks with UML: The Catalysis Approach , 1998 .
[7] Bassel R. Arafeh. A graph grammar model for concurrent and distributed software specification-in-large , 1995, J. Syst. Softw..
[8] Dennis W. Fife. Workshop Reports , 1966 .
[9] Raju Pandey,et al. Providing Fine-Grained Access Control for Mobile Programs Through Binary Editing , 1998 .
[10] Bran Selic,et al. A Generic Framework for Modeling Resources with UML , 2000, Computer.
[11] Christine Mingins,et al. Providing Trusted Components to the Industry , 1998, Computer.
[12] Khaled M. Khan,et al. Characterising user data protection of software components , 2000, Proceedings 2000 Australian Software Engineering Conference.
[13] LindqvistUlf,et al. A Map of Security Risks Associated with Using COTS , 1998 .
[14] Tolga Acar,et al. Managing System and Active-Content Integrity , 2000, Computer.