Spelling suggestions: "subject:"engineering software"" "subject:"ingineering software""
21 |
Simplifying development of secure software : Aspects and Agile methodsBoström, Gustav January 2006 (has links)
<p>Reducing the complexity of building secure software systems is an important goal as increased complexity can lead to more security flaws. This thesis aims at helping to reduce this complexity by investigating new programming techniques and software development methods for implementing secure software. We provide case studies on the use and effects of applying Aspect-oriented software development to Confidentiality, Access Control and Quality of Service implementation. We also investigate how eXtreme Programming can be used for simplifying the secure software development process by comparing it to the security engineering standards Common Criteria and the Systems Security Engineering Capability Maturity Model. We also explore the relationship between Aspect-oriented programming and Agile software development methods, such as eXtreme Programming.</p>
|
22 |
IRSS: integrated reservoir simulation systemZhang, Jiang 28 August 2008 (has links)
Not available / text
|
23 |
On the Design and Testing of Authorization SystemsSharifi, Alireza January 2013 (has links)
Authorization deals with the specification and management of accesses principals have to resources. In the design of an authorization system, sometimes we just implement the accessenforcement without having a precise semantics for it. In this dissertation we show that, there
exists a precise semantics that improves the efficiency of access-enforcement over the accessenforcement without precise semantics. We present an algorithm to produce an Access Control
List (ACL), in a particular authorization system for version control syatems called gitolite,
and we compare the implementation of our algorithm against the implementation that is already
being used.
As another design problem, we consider least-restrictive enforcement of the Chinese Wall
security policy. We show that there exists a least-restrictive enforcement of the Chinese Wall
Security Policy. Our approach to proving the thesis is by construction; we present an enforcement
that is least-restrictive. We also prove that such an enforcement mechanism cannot be subjectindependent.
We also propose a methodology that tests the implementation of an authorization system to
check whether it has properties of interest. The properties may be considered to be held in the
design of an authorization system, but they are not held in the implementation. We show that
there exist authorization systems that do not have the properties of interest.
|
24 |
Cost-Based Automatic Recovery Policy in Data CentersLuo, Yi 19 May 2011 (has links)
Today's data centers either provide critical applications to organizations or host computing clouds used by huge Internet populations. Their size and complex structure make management difficult, causing high operational cost. The large number of servers with various different hardware and software components cause frequent failures and need continuous recovery work. Much of the operational cost is from this recovery work. While there is significant research related to automatic recovery, from automatic error detection to different automatic recovery techniques, there is currently no automatic solution that can
determine the exact fault, and hence the preferred recovery action. There is some study on how to automatically select a suitable recovery action without knowing the fault behind the error.
In this thesis we propose an estimated-total-cost model based on analysis of the cost and the recovery-action-success probability. Our recovery-action selection is based on minimal estimated-total-cost; we implement three policies to use this model under different considerations of failed recovery attempts. The preferred policy is to reduce the recovery action-success probability when it failed to fix the error; we also study different reduction coefficients in this policy. To evaluate the various policies, we design and implement a
simulation environment. Our simulation experiments demonstrate significant cost
improvement over previous research based on simple heuristic models.
|
25 |
An empirical investigation of issues relating to software immigrantsHutton, Alistair James. January 2008 (has links)
Thesis (Ph.D.) - University of Glasgow, 2008. / Ph.D. thesis submitted to the Department of Computing Science, Faculty of Information and Mathematical Sciences, University of Glasgow, 2008. Includes bibliographical references. Print version also available.
|
26 |
Multilevel performance analysis of scenario specification for a presence system /Liu, Helen C. January 1900 (has links)
Thesis (M.Sc.) - Carleton University, 2003. / Includes bibliographical references (p. 135-138). Also available in electronic format on the Internet.
|
27 |
Key knowledge delivery factors affecting software development productivity /Sun, Zheng, January 1900 (has links)
Thesis (M. Eng.)--Carleton University, 2004. / Includes bibliographical references (p. 68-75). Also available in electronic format on the Internet.
|
28 |
A methodology for risk assessment of product line architecturesJalali, Amir H. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2008. / Title from document title page. Document formatted into pages; contains xi, 126 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 121-126).
|
29 |
Graphbasiertes Reengineering von Telekommunikationssystemen /Mosler, Christof. January 2009 (has links)
Zugl.: Aachen, Techn. Hochsch., Diss., 2009.
|
30 |
Hardware and software for WINC2R cognitive radio platformJain, Shalini. January 2008 (has links)
Thesis (M.S.)--Rutgers University, 2008. / "Graduate Program in Electrical and Computer Engineering." Includes bibliographical references (p. 59-60).
|
Page generated in 0.0804 seconds