Filters








51 Hits in 5.7 sec

An extensive systematic review on the Model-Driven Development of secure systems

Phu H. Nguyen, Max Kramer, Jacques Klein, Yves Le Traon
2015 Information and Software Technology  
Context: Model-Driven Security (MDS) is as a specialised Model-Driven Engineering research area for supporting the development of secure systems.  ...  E.g. regarding security modelling artefact, we found that developing domain-specific languages plays a key role in many MDS approaches.  ...  A similar MDS approach for developing 590 595 secure XML data warehouses is presented in [122, 123, 124, 125] More recently, the above mentioned techniques for secure DW development are also leveraged  ... 
doi:10.1016/j.infsof.2015.08.006 fatcat:to2pp3mfrfeo7f75yzvuc5zdoe

An Extensive Systematic Review on Model-Driven Development of Secure Systems [article]

Phu H. Nguyen, Max Kramer, Jacques Klein, Yves Le Traon
2015 arXiv   pre-print
Context: Model-Driven Security (MDS) is as a specialised Model-Driven Engineering research area for supporting the development of secure systems.  ...  E.g. regarding security modelling artefact, we found that developing domain-specific languages plays a key role in many MDS approaches.  ...  A similar MDS approach for developing secure XML data warehouses is presented in [Vela2006, Carlos2010, Vela2012, Vela2013] More recently, the above mentioned techniques for secure DW development are also  ... 
arXiv:1505.06557v1 fatcat:l46h4a37ards3ptbkn7cyarbdm

A Rational approach to model-driven development

A. W. Brown, S. Iyengar, S. Johnston
2006 IBM Systems Journal  
Models, modeling, and model transformation form the basis for a set of software development approaches that are known as model-driven development (MDD).  ...  In particular, we describe the key elements of MDD as they have emerged from the support of IBM Rationalt for model-driven approaches over more than a decade.  ...  We also recognize the input and support from all those in the IBM Rational Communities of Practice.  ... 
doi:10.1147/sj.453.0463 fatcat:2nkhacxvrnhojeilskdg3asai4

MDA based approach towards Design of Database for Banking System

Harsh Dev, Amit Seth
2012 International Journal of Computer Applications  
In this paper we have shown how database modeling is done with MDA for modelling at different levels like CIM, PIM, and PSM, which gives a new dimension to the database based application development.  ...  Model-driven development (MDD) Model-driven development (MDD) represents an approach to system engineering where models are used in the understanding, design, construction, deployment, operation,  ...  For developers and "meta-developers" CWM (Common Warehouse Metamodel): Modelling languages for data warehousing applications. (e.g.  ... 
doi:10.5120/7713-1129 fatcat:y5a6xuxwtbca7ejjrxyldlujmy

Guest Editor's Introduction: Model-Driven Engineering

D.C. Schmidt
2006 Computer  
Raytheon Experience with MDD Tools As the basis for our system execution modeling tools, the MDD paradigm and the Generic Modeling Environment and CoSMIC MDD tools developed at the Institute for Software  ...  Our approach uses domain-specific modeling languages (DSMLs) to represent "aspects of interest" such as atomicity of data access, end-to-end message delay, and resource contention. • Automated generation  ... 
doi:10.1109/mc.2006.58 fatcat:car37vwxxvfrpbhobimtnbdpui

Model-driven systems development and integration environment

M. Azmoodeh, N. Georgalas, S. Fisher
2005 BT technology journal  
It is clearly demonstrated that model-driven development has matured into a practical, industrialised, scalable and evolvable technology, culminating from decades of R&D on specification and design languages  ...  middleware, with heterogeneous data and process models.  ...  Acknowledgments The authors would like to express their grateful thanks for many fruitful discussions with and suggestions by their colleagues, especially Jim Hardwicke, Phil Holmes, and Shumao Ou.  ... 
doi:10.1007/s10550-005-0034-1 fatcat:rzdbcmzgmbahpize4htaukye4m

MDE between Promises and Challenges

Tahar Gherbi, Djamel Meslati, Isabelle Borne
2009 2009 11th International Conference on Computer Modelling and Simulation  
It starts by explaining the industrial world need for such approaches, sheds light on MDE's principles, examines these principles in practice through a relevant alternative named Model Driven Architecture  ...  Model Driven Engineering (MDE) is a software development approach family based on the use of models in the software construction.  ...  This study is a first step for our project under development, concerning the modelling and implementation of mobile agent applications with a MDE approach. • Automation: allowing the mapping, in an automatic  ... 
doi:10.1109/uksim.2009.13 dblp:conf/uksim/GherbiMB09 fatcat:pjcedqlqjneh5gyoraywwti6cu

Mining conference proceedings for corporate technology knowledge management

R.J. Watts, A.L. Porter
2005 A Unifying Discipline for Melting the Boundaries Technology Management:  
Even if such a process exists, the knowledge gains are limited to the experiences and communication skills of the individuals attending the conference.  ...  It shows how tracking research patterns and changes over a sequence of conferences can illuminate R&D trends, map dominant issues, and spotlight key research organizations.  ...  ) 21 University TAKMA(0.61); e-Neg(0.59) 49 XML MDDS(-0.5); WEBH(-0.5) 19 topic TrustBus(0.56) 38 standard HoloMAS(-0.46) 14 exchange VLDWH(0.49); WEBH(0.45) 20 data model WebS(-0.41)  ... 
doi:10.1109/picmet.2005.1509711 fatcat:in7ei7opzbamnmascj7t53n27i

MINING CONFERENCE PROCEEDINGS FOR CORPORATE TECHNOLOGY KNOWLEDGE MANAGEMENT

ROBERT J. WATTS, ALAN L. PORTER
2007 International Journal of Innovation and Technology Management (IJITM)  
Even if such a process exists, the knowledge gains are limited to the experiences and communication skills of the individuals attending the conference.  ...  It shows how tracking research patterns and changes over a sequence of conferences can illuminate R&D trends, map dominant issues, and spotlight key research organizations.  ...  ) 21 University TAKMA(0.61); e-Neg(0.59) 49 XML MDDS(-0.5); WEBH(-0.5) 19 topic TrustBus(0.56) 38 standard HoloMAS(-0.46) 14 exchange VLDWH(0.49); WEBH(0.45) 20 data model WebS(-0.41)  ... 
doi:10.1142/s0219877007001016 fatcat:xge2l6i4xnaqvbrdkwb7setolq

Survey and classification of model transformation tools

Nafiseh Kahani, Mojtaba Bagherzadeh, James R. Cordy, Juergen Dingel, Daniel Varró
2018 Journal of Software and Systems Modeling  
We then classify, compare and evaluate the tools based on a number of facets, each one consisting of several attributes with the possibility of overlap.  ...  In this paper, we compare and evaluate the current model transformation tools based on a qualitative framework.  ...  We also thank the anonymous reviewers for their valuable comments and suggestions in improving this report.  ... 
doi:10.1007/s10270-018-0665-6 fatcat:xo2spo3qynf5bnulmei3hioczi

Survey on Concern Separation in Service Integration [chapter]

Tomas Cerny, Michael J. Donahoo
2016 Lecture Notes in Computer Science  
While this approach brings many advantages from the perspective of service integration aiming to separate data manipulation from business processing, the standard approaches provide only limited structural  ...  Such independently deployable services provide an interface for retrieval and data manipulation in machine-readable formats.  ...  For these reasons, we may tend to avoid Model-Driven Development (MDD) [4] .  ... 
doi:10.1007/978-3-662-49192-8_42 fatcat:zkk7rnsb7reb5duhr6hxirgfva

A Model-driven Role-based Access Control for SQL Databases

Raimundas Matulevičius, Henri Lakk
2015 Complex Systems Informatics and Modeling Quarterly  
In this paper we propose a model-driven approach to manage SQL database access under the RBAC paradigm. The starting point of the approach is an RBAC model captured in SecureUML.  ...  This deferred security engineering approach makes it difficult for security requirements to be accurately captured and for the system's implementation to be kept aligned with these requirements as the  ...  Marlon Dumas for the discussion, his advises, and support.  ... 
doi:10.7250/csimq.2015-3.03 fatcat:hgymgl2s3na5nghsc5jx64kv6a

Design notations for secure software: a systematic literature review

Alexander van den Berghe, Riccardo Scandariato, Koen Yskout, Wouter Joosen
2015 Journal of Software and Systems Modeling  
These notations are aimed at documenting and analyzing security in a software design model. The fragmentation of the research space, however, has resulted in a complex tangle of different techniques.  ...  Hence, practitioners are confronted with the challenging task of scouting the right approach from a multitude of proposals.  ...  The study analyzes a total of 80 papers covering UMLsec, SecureUML, and Medina-DB (named Secure data warehouses).  ... 
doi:10.1007/s10270-015-0486-9 fatcat:hom7vhzkmnextkoulukb736gyq

Problems and Solutions of Service Architecture in Small and Medium Enterprise Communities [article]

Agustinus Andriyanto, Robin Doss
2020 arXiv   pre-print
Lack of resources is a challenge for small and medium enterprises (SMEs) in implementing an IT-based system to facilitate more efficient business decisions and expanding the market.  ...  This paper explores and analyses the frameworks proposed by previous studies in the context of inter-enterprise SOA for SMEs.  ...  ., a resource warehouse proposed by [41] provides a suitable data warehousing infrastructure to SMEs which have an enormous volume of data.  ... 
arXiv:2004.10660v1 fatcat:iccl46gz5vcqfjkoohsisd2gqy

A comparison framework for runtime monitoring approaches

Rick Rabiser, Sam Guinea, Michael Vierhauser, Luciano Baresi, Paul Grünbacher
2017 Journal of Systems and Software  
The aim of our research therefore was to develop a comparison framework for runtime monitoring approaches.  ...  Their sheer number and heterogeneity, however, make it hard to find the right approach for a specific application or purpose.  ...  our framework, e.g., to support the selection of an approach for a particular monitoring problem or application context.  ... 
doi:10.1016/j.jss.2016.12.034 fatcat:foeate3v2fb3fbky5z5zh7x3we
« Previous Showing results 1 — 15 out of 51 results