Sciweavers

5475 search results - page 191 / 1095
» Model Driven Security
Sort
View
124
Voted
CCS
2007
ACM
15 years 9 months ago
Security under key-dependent inputs
In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by B...
Shai Halevi, Hugo Krawczyk
126
Voted
ASWEC
2005
IEEE
15 years 9 months ago
Extending UML for Model Composition
The success of UML and more generally, of the model driven approach, has led to a proliferation of models, representing various systems, but the description of large applications ...
Jacky Estublier, Anca Daniela Ionita
132
Voted
FSEN
2009
Springer
15 years 10 months ago
Evolution Control in MDE Projects: Controlling Model and Code Co-evolution
The dream of Model Driven Engineering (MDE) is that Software Engineering activities should be performed only on models, but in practice a significant amount of programming is still...
Jacky Estublier, Thomas Leveque, Germán Veg...
145
Voted
ECMDAFA
2009
Springer
119views Hardware» more  ECMDAFA 2009»
15 years 1 months ago
Managing Model Adaptation by Precise Detection of Metamodel Changes
Technological and business changes influence the evolution of software systems. When this happens, the software artifacts may need to be adapted to the changes. This need is rapidl...
Kelly Garcés, Frédéric Jouaul...
134
Voted
HICSS
2008
IEEE
130views Biometrics» more  HICSS 2008»
15 years 10 months ago
Enterprise Modeling for Information System Development within MDA
Object-oriented analysis suggests semiformal usecase driven techniques for problem domain modeling from a computation independent viewpoint. The proposed approach called Topologic...
Janis Osis, Erika Asnina