A general approach to evaluation of secure systems (English)
- New search for: Shi, Q.
- New search for: Zhang, N.
- New search for: Shi, Q.
- New search for: Zhang, N.
In:
COMPSAC, IEEE Annual International Computer Software & Applications Conference, 19
;
396-401
;
1995
-
ISBN:
- Conference paper / Print
-
Title:A general approach to evaluation of secure systems
-
Additional title:Über die Bewertung sicherer Systeme
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE Computer Society Press
-
Place of publication:Los Alamitos, Washington
-
Publication date:1995
-
Size:6 Seiten, 2 Bilder, 5 Quellen
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 12
-
FunZ designs, a bridge between Z specifications and Haskell implementationsSherrell, L.B. / Carver, D.L. et al. | 1995
- 18
-
Automatic generation of C++ code fram an ESCRO2 specificationGrabow, P.C. / Liu, L. et al. | 1995
- 26
-
A multi-dimensional data visualization tool for knowledge discovery in databasesLee, Wing-Yan / Ong, Hwee-Leng / Toh, Eng-Whatt / Chan, Silu-Kong et al. | 1995
- 32
-
A knowledge-based approach for worst-case timing analysis of microprocessor systemsYuen, S.M. / Lam, K.P. et al. | 1995
- 40
-
Knowledge reuse through the application of the object knowledge canonical formHuarng, Kunhuang / Simmons, D.B. et al. | 1995
- 50
-
A method for analyzing properties of hierarchical predicate transition netsHe, X. et al. | 1995
- 62
-
Expressing JSD in ZLee, J. / Huang, W.T. / Chang, C.K. / Pan, J.I. et al. | 1995
- 91
-
Improving software process to implement a wireless mobile networkGibson, K.A. et al. | 1995
- 93
-
Parallel software engineering. Goals 2000Murphy, C. et al. | 1995
- 114
-
Static semantics and priority schemes for statechartsHong, Hyoung-Seok / Kim, Jeong-Hyun / Sung Deok Cha / Kwon, Yong-Rae et al. | 1995
- 144
-
Performance evaluation of dynamic signature file methodsYoo, Jae-Soo / Kim, M.H. / Lee, Y.J. / Im, B.M. et al. | 1995
- 172
-
The object-inferencing framework: a Prolog-based approach for extracting structure from computer graphicsRussomanno, D.J. et al. | 1995
- 178
-
User interface design: the who, the what, and the how revisitedStary, C. et al. | 1995
- 199
-
Application layer software fault tolerance for distributed object-oriented systemsKim, H.C. / Nair, V.S.S. et al. | 1995
- 205
-
IPCC++: a C++ extension for interprocess communication with objectsStubbs, S.S. / Carves, D.L. et al. | 1995
- 218
-
Quality assessment for multiple server cooperating systemsYen, I.L. / Chen, I.R. et al. | 1995
- 224
-
Improving software quality through a novel testing strategyZeng, X. / Tsai, J.J.P. / Weigert, T.J. et al. | 1995
- 239
-
A test strategy for object-oriented programsKung, D. / Gao, J. / Hsia, P. / Toyoshima, Y. / Chen, C. et al. | 1995
- 256
-
Architectural framework for developing concurrent applicationsBruno, G. / Agarwal, R. et al. | 1995
- 262
-
Creating a distributed environment using object oriented technologyChang, C.K. / Haswarey, B. / Mongkolwat, P. et al. | 1995
- 284
-
Reverse engineering from COBOL to narrative specificationYoshino, T. / Uehara, S. / Ookubo, T. / Suguta, S. / Hotta, Y. / Sonobe, M. et al. | 1995
- 298
-
HyperDisco: an object-oriented hypermdia framework for flexible software system integrationWiil, U.K. et al. | 1995
- 306
-
Scheduling dependent real-time multimedia tasks on distributed systemsMei, Hsing et al. | 1995
- 334
-
The multimedia desktop conference system adaptability in network traffic on LANJung, Jin-Ho / Yang, H.S. et al. | 1995
- 339
-
Storing continuous media objects using parallelism with mergingWatkins, A.R. / Omiecinski, E. et al. | 1995
- 370
-
An architecture-independent software development approach for parallel processing systemYau, S.S. / Bae, Doo-Hwan / Wang, Jun et al. | 1995
- 376
-
Software support for asynchronous computing across networksCavender, M.E. / Zhang, X. et al. | 1995
- 396
-
A general approach to evaluation of secure systemsShi, Q. / Zhang, N. et al. | 1995
- 402
-
Enforcing complex security policies for commercial applicationsKao, I.L. / Chow, R. et al. | 1995
- 409
-
A framework for designing safe software systemsSubramanian, S. / Vishnuvajjala, R.V. / Mojdehbakhsh, R. / Tsai, W.T. / Elliott, L. et al. | 1995
- 422
-
Information mediation system design strategy among telecommunication related information systemsShen, Fu-Fu / Lin, Whei-Yee / Wong, Chea-Yean / Cheng, Chien-Wei / Chen, Hsien-Sheng et al. | 1995