Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
This paper presents an implementation of the “form template method” refactoring. This transformation has not been automated yet, but has many similarities with other transform...
A Web site is a hyperlinked network environment, which consists of hundreds of inter-connected pages, usually without an engineered architecture. This is often a large, complex We...
Software systems have to be flexible in order to cope with evolving requirements. However, since it is impossible to predict with certainty what future requirements will emerge, i...
: Knowledge management is a relatively young discipline. Nevertheless, it has accumulated a valuable body-of-knowledge in the structuring of knowledge and in the design of socio-te...