We believe that for developing applications in a specific domain, the best kindofsoftwarecomponent model touseis adomain-specificone. Wealso believe that current component models i...
The paper proposes an assessment scheme for the security properties of software components. The proposed scheme consists of three stages: (i) a system-specific security requireme...
: The mining of generic software components from legacy systems can be used as an auxiliary technique to revitalize systems. This paper presents a software maintenance approach tha...