نتایج جستجو برای: مدل breach gui
تعداد نتایج: 129795 فیلتر نتایج به سال:
Zusammenfassung: Dieser Beitrag beschreibt eine neue statische Analyse von Programmen mit graphischer Oberfläche (GUI). Die Analyse aus dem Bauhaus-Projekt extrahiert aus dem Quellcode die Widget-Hierarchien der GUI, GUI-Ereignisse und deren Reaktionen. Einige Anwendungen, beispielsweise eineMigration zu einemGUIBuilder, werden kurz vorgestellt. Testresultate untermauern die Tragfähigkeit unser...
In recent years, increasing complexity of graphical user interfaces (GUIs) of applications has led to problems in GUI management, since there is no single layout to fulfill every user’s needs. GUI editors have been developed to enhance end-user options but they commonly fail to preserve personalized GUIs. This paper presents an extension to the GUI editor built into the Auckland Layout Model (A...
The Vienna Development Method is supported by several tools. These tools allow generating Java code from a VDM++ specification but do not generate a graphical user interface (GUI). This paper describes a generic approach and tool to automatically generate a GUI in Java from a VDM++ specification. The generated GUI calls methods of the VDM++ specification, which allows testing the specification ...
As the nation confronts a growing tide of security breaches, the importance of having quality data breach information systems becomes paramount. Yet too little attention is paid to evaluating these systems. This article draws on data quality scholarship to develop a yardstick that assesses the quality of data breach notification systems in the U.S. at both the state and national levels from the...
Introduction A decade has passed since the enactment of data breach notification laws (DBNLs) in numerous U.S. states. These laws mandate companies that have suffered a data breach to inform the customers whose data might have been exposed. The intent of DBNLs can perhaps be best summed up in the phrase: “sunlight is the best disinfectant”. Whether the goal of incentivizing better security prac...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید