Sciweavers

87 search results - page 8 / 18
» Architectural Risk Analysis of Software Systems Based on Sec...
Sort
View
ICSE
2008
IEEE-ACM
14 years 7 months ago
An ontology-driven software architecture evaluation method
Software architecture evaluation has a crucial role in the life cycle of software intensive systems. In this paper we propose an approach to empower a software architecture evalua...
Aida Erfanian, Fereidoun Shams Aliee
SEKE
2007
Springer
14 years 1 months ago
Performance Analysis of the Active Object Pattern in Middleware
A number of enterprises are turning towards the Service Oriented Architecture (SOA) approach for their systems due to the number of benefits it offers. A key enabling technology ...
Paul J. Vandal, Swapna S. Gokhale, Aniruddha S. Go...
FASE
2009
Springer
14 years 1 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
IEEESP
2007
98views more  IEEESP 2007»
13 years 7 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
ER
2004
Springer
167views Database» more  ER 2004»
14 years 12 days ago
A CASE Tool for Geographic Database Design Supporting Analysis Patterns
: This paper describes the development of an open source CASE tool, the ArgoCASEGEO, and its modular architecture. The ArgoCASEGEO allows the geographic database modelling based on...
Jugurta Lisboa Filho, Victor de Freitas Sodr&eacut...