Sciweavers

1136 search results - page 101 / 228
» A Multi-variant Approach to Software Process Modelling
Sort
View
QSIC
2007
IEEE
14 years 3 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao
ESEC
1999
Springer
14 years 1 months ago
The CIP Method: Component- and Model-Based Construction of Embedded Systems
CIP is a model-based software development method for embedded systems. The problem of constructing an embedded system is decomposed into a functional and a connection problem. The ...
Hugo Fierz
SYNASC
2006
IEEE
105views Algorithms» more  SYNASC 2006»
14 years 3 months ago
A Meta-Model for Enterprise Applications
In the last years, as object-oriented software systems became more and more complex, the need of performing automatically reverse engineering upon these systems has increased sign...
Cristina Marinescu, Ioan Jurca
SETP
2007
13 years 10 months ago
Using Communication Objects During Requirements Analysis
Requirement analysis continues to be one of the most critical and challenging phases during the software development process. Many object-oriented methodologies identify three pri...
Peter J. Clarke, Yingbo Wang, Tuan L. Cameron, Yal...
SACMAT
2003
ACM
14 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck