Sciweavers

91 search results - page 3 / 19
» Defining Misuse within the Development Process
Sort
View
SIGMOD
2006
ACM
142views Database» more  SIGMOD 2006»
14 years 5 months ago
Model driven development of secure XML databases
In this paper, we propose a methodological approach for the model driven development of secure XML databases (DB). This proposal is within the framework of MIDAS, a model driven m...
Belén Vela, Eduardo Fernández-Medina, Esperanza ...
COLCOM
2008
IEEE
13 years 7 months ago
Mashup Model and Verification Using Mashup Processing Network
Abstract. Mashups are defined to be lightweight Web applications aggregating data from different Web services, built using ad-hoc composition and being not concerned with long term...
Ehtesham Zahoor, Olivier Perrin, Claude Godart
HICSS
2010
IEEE
190views Biometrics» more  HICSS 2010»
14 years 5 days ago
Managing the Current Customization of Process Related IT-Services
IT service providers are increasingly required to orientate their service portfolio towards the IT support of their consumer’s business processes. This enables diversification a...
Henrik Brocke, Falk Uebernickel, Walter Brenner
DAGSTUHL
2007
13 years 6 months ago
Model-Driven Development for End-Users, too!?
iary models in order to bridge the semantic gap between high-level, abstract user requirements and low-level, concrete programs and to support a stepwise refinement process. This d...
Gregor Engels
SIGSOFT
2002
ACM
14 years 6 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...