Sciweavers

391 search results - page 2 / 79
» Domain engineered configuration control
Sort
View
SIGSOFT
2008
ACM
14 years 6 months ago
Empirical evidence of the benefits of workspace awareness in software configuration management
In this paper, we present results from our empirical evaluations of a workspace awareness tool that we designed and implemented to augment the functionality of software configurat...
Anita Sarma, David F. Redmiles, André van d...
FASE
2010
Springer
13 years 3 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim
CCS
2008
ACM
13 years 7 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
EUROMICRO
2009
IEEE
14 years 20 hour ago
Foundations for a Model-Driven Integration of Business Services in a Safety-Critical Application Domain
—Current architectures for systems integration provide means for forming agile business processes by manually or dynamically configuring the components. However, a major challeng...
Richard Mordinyi, Thomas Moser, eva Kühn, Ste...
IEAAIE
1998
Springer
13 years 9 months ago
Generating Heuristics to Control Configuration Processes
Abstract. Configuration is the process of composing a system from a set of components such that the system fulfills a set of desired demands. The configuration process relies on a ...
Benno Stein