Sciweavers

5475 search results - page 135 / 1095
» Model Driven Security
Sort
View
94
Voted
CAISE
2008
Springer
15 years 2 months ago
A Tool for Process Merging in Business-Driven Development
Abstract. Business-driven development favors the construction of process modifferent abstraction levels and by different people. As a consequence, there is a demand for consolidati...
Jochen Malte Küster, Christian Gerth, Alexand...
111
Voted
IEEEARES
2007
IEEE
15 years 7 months ago
Agent Alliances: A Means for Practical Threshold Signature
In [7] we have proposed a model for the robust and private evaluation of a function within a group of cooperating mobile agents, called an agent Alliance. The model has been given...
Regine Endsuleit, Christoph Amma
100
Voted
TEAA
2005
Springer
116views Hardware» more  TEAA 2005»
15 years 6 months ago
MDA and Analysis of Web Applications
Enterprise systems are mission critical. As a result, ensuring their correctness is of primary concern. This paper aids to the analysis of Web Applications, focusing on the aspects...
Behzad Bordbar, Kyriakos Anastasakis
ENTCS
2007
108views more  ENTCS 2007»
15 years 22 days ago
Termination Criteria for DPO Transformations with Injective Matches
Reasoning about graph and model transformation systems is an important means to underpin model-driven software engineering, such as Model-Driven Architecture (MDA) and Model Integ...
Tihamer Levendovszky, Ulrike Prange, Hartmut Ehrig
IEEEARES
2006
IEEE
15 years 6 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson