Architectural risk analysis of software systems based on security patterns
The importance of software security has been profound, since most attacks to software
systems are based on vulnerabilities caused by poorly designed and developed software …
systems are based on vulnerabilities caused by poorly designed and developed software …
Privacy patterns for online interactions
A proper security architecture is an essential part of implementing robust and reliable
networked applications. Security patterns have shown how reoccurring problems can be …
networked applications. Security patterns have shown how reoccurring problems can be …
Machine learning and software engineering in health informatics
Health informatics is a field in which the disciplines of software engineering and machine
learning necessarily co-exist. This discussion paper considers the interaction of software …
learning necessarily co-exist. This discussion paper considers the interaction of software …
[PDF][PDF] Privacy control patterns for compliant application of GDPR
The exchange of sensitive information has become an important part of our daily lives. This
does effect business and personal data. Data exchange is subject to legal regulations. Since …
does effect business and personal data. Data exchange is subject to legal regulations. Since …
The dublo architecture pattern for smooth migration of business information systems: An experience report
W Hasselbring, R Reussner, H Jaekel… - Proceedings. 26th …, 2004 - ieeexplore.ieee.org
While the importance of multi-tier architectures for enterprise information systems is widely
accepted and their benefits are well published, the systematic migration from monolithic …
accepted and their benefits are well published, the systematic migration from monolithic …
Runtime software architecture based software online evolution
Runtime environment of software are becoming more and more dynamic and changeful,
while pervasive computing and Web services further this situation. Software systems are not …
while pervasive computing and Web services further this situation. Software systems are not …
The XIS Approach and Principles.
AR da Silva - EUROMICRO, 2003 - ieeexplore.ieee.org
XIS is a R&D project which mission is to analyze, develop and evaluate mechanisms and
tools to produce information systems from a more efficient and productive way than it is done …
tools to produce information systems from a more efficient and productive way than it is done …
Quantitative evaluation of systems with security patterns using a fuzzy approach
ST Halkidis, A Chatzigeorgiou… - On the Move to Meaningful …, 2006 - Springer
Abstract The importance of Software Security has been evident, since it has been shown that
most attacks to software systems are based on vulnerabilities caused by software poorly …
most attacks to software systems are based on vulnerabilities caused by software poorly …
[PDF][PDF] The XIS Generative Programming Techniques
AR da Silva, G Lemos, T Matias, M Costa - COMPSAC-NEW YORK-, 2003 - academia.edu
XIS1 is a R&D project which main mission is to analyze, develop and evaluate mechanisms
and tools to produce information systems from a more abstract, highlevel, efficient and …
and tools to produce information systems from a more abstract, highlevel, efficient and …
[PDF][PDF] A model for develo** j2ee applications based on design patterns.
V Gilart-Iglesias, FM Pérez, AH Sáez… - IADIS AC, 2005 - academia.edu
Nowadays the Internet has become a suitable environment for the new business models, by
means of which companies can reach the new open market world-widely. However …
means of which companies can reach the new open market world-widely. However …