Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java
Dataflow diagrams (DFDs) are a valuable asset for securing applications, as they are the
starting point for many security assessment techniques. Their creation, however, is often …
starting point for many security assessment techniques. Their creation, however, is often …
Featracer: Locating features through assisted traceability
Locating features is one of the most common software development activities. It is typically
done during maintenance and evolution, when developers need to identify the exact places …
done during maintenance and evolution, when developers need to identify the exact places …
Visualization of object-oriented software in a city metaphor: Comprehending the implemented variability and its technical debt
While many large-scale software systems intensively implement variability to reuse software
and speed up development, they often do not document it, hampering its comprehension …
and speed up development, they often do not document it, hampering its comprehension …
Featurevista: Interactive feature visualization
Comprehending and characterizing the spread and interaction of features in a software
system is know to be difficult and error-prone. This paper presents FeatureVista, a …
system is know to be difficult and error-prone. This paper presents FeatureVista, a …
FM-PRO: A Feature Modeling Process
Almost any software system needs to exist in multiple variants. While branching or forking—
aka clone & own—are simple and inexpensive strategies, they do not scale well with the …
aka clone & own—are simple and inexpensive strategies, they do not scale well with the …
Virtual Platform: Effective and Seamless Variability Management for Software Systems
Customization is a general trend in software engineering, demanding systems that support
variable stakeholder requirements. Two opposing strategies are commonly used to create …
variable stakeholder requirements. Two opposing strategies are commonly used to create …
A Taxonomy of Functional Security Features and How They Can Be Located
Security must be considered in almost every software system. Unfortunately, selecting and
implementing security features remains challenging due to the variety of security threats and …
implementing security features remains challenging due to the variety of security threats and …
An IDE Plugin for Clone Management
Development and maintenance in variant-rich systems often involves the replication of
specific software code, known as software cloning. This process allows for code reuse but …
specific software code, known as software cloning. This process allows for code reuse but …
[PDF][PDF] Cost and Benefit of Tracing Features with Embedded Annotations
Features are commonly used by developers and users to describe the functional and non-
functional characteristics of software. Especially agile development methods, such as …
functional characteristics of software. Especially agile development methods, such as …
Facilitating Feature-Oriented Quality Assurance in Low-Maturity Variant-Rich Systems
M Mukelabai - 2022 - gupea.ub.gu.se
Context: Many software systems exist in several variants customized for specific stakeholder
requirements, such as different market segments or hardware constraints. This …
requirements, such as different market segments or hardware constraints. This …