Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
In this paper, we propose an approach for systematic security hardening of software based on aspect-oriented programming and Gimple language. We also present the first steps towar...
Deriving requirements and architecture in concert implies the joint elicitation and specification of the problem and the structure of the solution. In this paper we argue that suc...
Adam Trendowicz, Allen H. Dutoit, Antje von Knethe...
Usually complex systems are controlled by an operator co-operating with a computer-based controller. The controlling software runs in continuous interaction with the operator and c...
We highlight some of the challenges in valuing flexibility and investment decisions in Software Product Line Architectures (SPLA). We explain the limitations of traditional approa...