IEEE Transactions on Software Engineering

Issue 1 • Jan. 1996

Filter Results

Displaying Results 1 - 7 of 7
  • Introduction To The Special Section

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (202 KB)
    Freely Available from IEEE
  • A general theory of composition for a class of “possibilistic” properties

    Publication Year: 1996, Page(s):53 - 67
    Cited by:  Papers (49)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1440 KB)

    Since the initial work of Daryl McCullough (1987) on the subject, the security community has struggled with the problem of composing “possibilistic” information-flow properties. Such properties fall outside of the Alpern-Schneider safety/liveness domain, and hence, they are not subject to the Abadi-Lamport Composition Principle. The paper introduces a set of trace constructors called s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational issues in secure interoperation

    Publication Year: 1996, Page(s):43 - 52
    Cited by:  Papers (62)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1012 KB)

    Advances in distributed systems and networking technology have made interoperation not only feasible but also increasingly popular. We define the interoperation of secure systems and its security, and prove complexity and composability results on obtaining optimal and secure interoperation. Most problems are NP-complete even for systems with very simple access control structures, while for a gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Property-based software engineering measurement

    Publication Year: 1996, Page(s):68 - 86
    Cited by:  Papers (269)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2224 KB)

    Little theory exists in the field of software system measurement. Concepts such as complexity, coupling, cohesion or even size are very often subject to interpretation and appear to have inconsistent definitions in the literature. As a consequence, there is little guidance provided to the analyst attempting to define proper measures for specific problems. Many controversies in the literature are s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prudent engineering practice for cryptographic protocols

    Publication Year: 1996, Page(s):6 - 15
    Cited by:  Papers (130)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1016 KB)

    We present principles for designing cryptographic protocols. The principles are neither necessary nor sufficient for correctness. They are however helpful, in that adherence to them would have prevented a number of published errors. Our principles are informal guidelines; they complement formal methods, but do not assume them. In order to demonstrate the actual applicability of these guidelines, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model for secure protocols and their compositions

    Publication Year: 1996, Page(s):16 - 30
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1712 KB)

    The paper develops a foundation for reasoning about protocol security. We adopt a model-based approach for defining protocol security properties. This allows us to describe security properties in greater detail and precision than previous frameworks. Our model allows us to reason about the security of protocols, and considers issues of beliefs of agents, time, and secrecy. We prove a composition t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure group membership protocol

    Publication Year: 1996, Page(s):31 - 42
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1260 KB)

    A group membership protocol enables processes in a distributed system to agree on a group of processes that are currently operational. Membership protocols are a core component of many distributed systems and have proved to be fundamental for maintaining availability and consistency in distributed applications. We present a membership protocol for asynchronous distributed systems that tolerates th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org