Sciweavers

757 search results - page 70 / 152
» Composing Security-Aware Software
Sort
View
GI
2005
Springer
15 years 9 months ago
Programming in the Large based on the Business Process Modelling Notation
: A software application is related to the processes it supports. Today, UML diagrams esp. use case diagrams and activity diagrams are often used to model the relevant aspects of t...
Christian Emig, Christof Momm, Jochen Weisser, Seb...
GI
2004
Springer
15 years 8 months ago
Reliability study of an embedded operating system for industrial applications
: Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour despite the appearance of errors. In ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...
AOSD
2010
ACM
15 years 8 months ago
A permission system for secure AOP
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of ...
Wouter De Borger, Bart De Win, Bert Lagaisse, Wout...
158
Voted
FMCO
2003
Springer
188views Formal Methods» more  FMCO 2003»
15 years 8 months ago
Consistency Management Within Model-Based Object-Oriented Development of Components
Abstract. The Unified Modeling Language (UML) favors the construction of models composed of several submodels, modeling the system comunder development at different levels of abs...
Jochen Malte Küster, Gregor Engels
142
Voted
APSEC
2002
IEEE
15 years 8 months ago
Quality Driven Transformation Compositions for Object Oriented Migration
Reengineering legacy software systems to object oriented platforms has received significant attention over the past few years. In this paper, we propose a goal driven software mig...
Ying Zou, Kostas Kontogiannis