Sciweavers

1288 search results - page 52 / 258
» Securing aspect composition
Sort
View
ACSD
1998
IEEE
105views Hardware» more  ACSD 1998»
14 years 1 months ago
Visual Formalisms Revisited
The development of an interactive application is a complex task that has to consider data, behavior, intercommunication, architecture and distribution aspects of the modeled syste...
Radu Grosu, Gheorghe Stefanescu, Manfred Broy
RE
2005
Springer
14 years 2 months ago
CoCA: A Composition-Centric Approach to Requirements Engineering
In this paper we discuss how mutual influences (e.g. conflicts) of different stakeholder concerns can be detected and reasoned about through composition and stepwise refinement. S...
Ruzanna Chitchyan, Ian Sommerville, Awais Rashid
BDIM
2008
IEEE
119views Business» more  BDIM 2008»
13 years 11 months ago
On integrating trust into business-driven management of web services and their compositions
This paper discusses why trust is an essential aspect for business-driven IT management, as well as how it impacts management of web services and their compositions. We summarize t...
Chern Har Yew, Vladimir Tosic, Hanan Lutfiyya
ENTCS
2010
99views more  ENTCS 2010»
13 years 9 months ago
Describing Secure Interfaces with Interface Automata
Interface automata are a model that allows for the representation of stateful interfaces. In this paper we introduce a variant of interface automata, which we call interface struc...
Matias Lee, Pedro R. D'Argenio
ESORICS
2008
Springer
13 years 10 months ago
Compositional Refinement of Policies in UML - Exemplified for Access Control
The UML is the de facto standard for system specification, but offers little specialized support for the specification and analysis of policies. This paper presents Deontic STAIRS,...
Bjørnar Solhaug, Ketil Stølen