Domain Specific Modeling (DSM) has been used for a while in many scenarios, case studies, and applications successfully. This paper intends to present a new application of DSM for ...
Syed Imran, Ioannis M. Dokas, John Feehan, Francli...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Despite the widespread recognition that information technology (IT) and business process are tightly connected, existing system design methods provide limited guidance on how to t...
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
: This paper contributes to the identification and testing of factors important for the success of open source software (OSS) projects. We present an analysis of OSS communities as...