Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Irum Rauf"'
Autor:
Sarah Robinson, Jim Buckley, Luigina Ciolfi, Conor Linehan, Clare McInerney, Bashar Nuseibeh, John Twomey, Irum Rauf, John McCarthy
Publikováno v:
Journal of Responsible Technology, Vol 19, Iss , Pp 100087- (2024)
In recent years, we have seen many examples of software products unintentionally causing demonstrable harm. Many guidelines for ethical and responsible computing have been developed in response. Dominant approaches typically attribute liability and b
Externí odkaz:
https://doaj.org/article/9895a2feec30423fa48c67645c5aee08
Autor:
Irum Rauf, Elena Troubitsyna
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 271, Iss Proc. IMPEX 2017 and FM&MDD 2017, Pp 80-94 (2018)
The widespread adoption of cloud computing has resulted in the proliferation of open source cloud computing frameworks that give more control to enterprises over their data and networks. Though the benefits of open source software are widely recogniz
Externí odkaz:
https://doaj.org/article/1f14785dca2245afbae0482acb59fe29
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 98, Iss Proc. WWV 2012, Pp 77-92 (2012)
REST web services can offer complex operations that do more than just simply creating, retrieving, updating and deleting information from a database. We have proposed an approach to design the interfaces of behavioral REST web services by defining a
Externí odkaz:
https://doaj.org/article/a4b902b3cc0445b7974085e1d39c8c7c
Autor:
Mark Levine, Irum Rauf, Bashar Nuseibeh, John N. Towse, Awais Rashid, Helen Sharp, Thein Than Tun, Dirk van der Linden, Paul Lunn, Tamara Lopez, Marian Petre
Publikováno v:
Rauf, I, Petre, M, Tun, T, Lopez, T, Lunn, P, van der Linden, D, Towse, J, Sharp, H, Levine, M, Rashid, A & Nuseibeh, B 2021, ' The Case for Adaptive Security Interventions ', ACM Transactions on Software Engineering and Methodology, vol. 31, no. 1, 9, pp. 1-52 . https://doi.org/10.1145/3471930
Despite the availability of various methods and tools to facilitate secure coding, developers continue to write code that contains common vulnerabilities. It is important to understand why technological advances do not sufficiently facilitate develop
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::211a0e38d53cd8337bf4e4c0d671c78c
https://research-information.bris.ac.uk/ws/files/313645753/The_case_for_Adaptive_Security_Interventions.pdf
https://research-information.bris.ac.uk/ws/files/313645753/The_case_for_Adaptive_Security_Interventions.pdf
An Application Programming Interface (API) provides a programmatic interface to a software component that is often offered publicly and may be used by programmers who are not the API’s original designers. APIs play a key role in software reuse. By
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::586b9f761d01213e8ee579ac38790acc
http://oro.open.ac.uk/61584/1/article-2019.pdf
http://oro.open.ac.uk/61584/1/article-2019.pdf
Publikováno v:
ICWS
REST APIs are being increasingly used in the industry including their application in safety-critical domain and in the IoT world. They offer basic CRUD (create, retrieve, update and delete) interfaces. However, REST APIs can be used to build services
Publikováno v:
Bled eConference
Autor:
Elena Troubitsyna, Irum Rauf
Publikováno v:
DSN
Authorization is an important security concern in cloud computing environments. It aims at regulating an access of the users to system resources. A large number of resources associated with REST APIs typical in cloud makes an implementation of securi
Autor:
Irum Rauf, Elena Troubitsyna
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319659473
SERENE
SERENE
Open Source software is increasingly used in a wide spectrum of applications. While the benefits of the open source components are unquestionable now, there is a great concern over security assurance provided by such components. Often open source sof
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b963d59c48a5cd14c772b4de2d26c78
https://doi.org/10.1007/978-3-319-65948-0_5
https://doi.org/10.1007/978-3-319-65948-0_5
Publikováno v:
VL/HCC
An Application-Programming Interface or API provides a set of program functions that can be used to build new applications. In this paper, we study how to use the expectation-confirmation theory (ECT) to identify API usability problems, and what obst