Sciweavers

62 search results - page 11 / 13
» Requirements Traceability and Transformation Conformance in ...
Sort
View
WWW
2005
ACM
14 years 6 months ago
Web services security configuration in a service-oriented architecture
Security is one of the major concerns when developing missioncritical business applications, and this concern motivated the Web Services Security specifications. However, the exis...
Takeshi Imamura, Michiaki Tatsubori, Yuichi Nakamu...
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 5 months ago
Automatically Discovering Hidden Transformation Chaining Constraints
Abstract. Model transformations operate on models conforming to precisely defined metamodels. Consequently, it often seems relatively easy to chain them: the output of a transforma...
Raphaël Chenouard, Frédéric Jou...
DAWAK
2009
Springer
13 years 3 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...
SOCO
2007
Springer
13 years 12 months ago
Synthesizing Communication Middleware from Explicit Connectors in Component Based Distributed Architectures
In component based software engineering, an application is build by composing trusted and reusable units of execution, the components. A composition is formed by connecting the com...
Dietmar Schreiner, Karl M. Göschka
ADBIS
2010
Springer
173views Database» more  ADBIS 2010»
13 years 6 months ago
Applying the UFO Ontology to Design an Agent-Oriented Engineering Language
The problem of designing suitable conceptual modeling languages for system engineering is far from being solved. In the past years, some works have proposed the use of foundational...
Renata S. S. Guizzardi, Giancarlo Guizzardi