Sciweavers

957 search results - page 149 / 192
» Negotiations and Petri Nets
Sort
View
119
Voted
WORDS
2005
IEEE
15 years 5 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...
FASE
2005
Springer
15 years 5 months ago
Termination Criteria for Model Transformation
Model Transformation has become central to most software engineering activities. It refers to the process of modifying a (usually graphical) model for the purpose of analysis (by i...
Hartmut Ehrig, Karsten Ehrig, Juan de Lara, Gabrie...
WEBI
2005
Springer
15 years 5 months ago
IPR: Automated Interaction Process Reconciliation
Inter-organizational business processes usually require complex and time-consuming interactions between partners than simple interactions supported by WSDL. Automated reconciliati...
Zongxia Du, Jinpeng Huai, Yunhao Liu, Chunming Hu,...
88
Voted
SEKE
2004
Springer
15 years 4 months ago
Integrating Security Administration into Software Architectures Design
Software architecture plays a central role in developing software systems that satisfy functionality and security requirements. However, little has been done to integrate system d...
Huiqun Yu, Xudong He, Yi Deng, Lian Mo
UML
2004
Springer
15 years 4 months ago
A Metamodel for Generating Performance Models from UML Designs
Several different kinds of performance models can be generated from sets of scenarios that describe typical responses of a system, and their use of resources. The Core Scenario Mod...
Dorin Bogdan Petriu, C. Murray Woodside