We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Recently, it is one of the most challenging fields in software engineering for embedded software development, since the advancement of embedded technologies has made our life incre...
We present a polynomial upper bound for flattening of UML statecharts. An efficient flattening technique is derived and implemented in SCOPE—a code generator targeting constra...
Many research approaches in software engineering propose models or extensions to existing models. This includes system models, such as UML models, and project management artifacts,...
Jonas Helming, Maximilian Koegel, Hoda Naguib, Mir...