Model-driven reverse engineering approaches: A systematic literature review
This paper explores and describes the state of the art for what concerns the model-driven
approaches proposed in the literature to support reverse engineering. We conducted a …
approaches proposed in the literature to support reverse engineering. We conducted a …
A feature-based survey of model view approaches
When dealing with complex systems, information is very often fragmented across many
different models expressed within a variety of (modeling) languages. To provide the relevant …
different models expressed within a variety of (modeling) languages. To provide the relevant …
Model-based security analysis of feature-oriented software product lines
Today's software systems are too complex to ensure security after the fact–security has to be
built into systems by design. To this end, model-based techniques such as UMLsec support …
built into systems by design. To this end, model-based techniques such as UMLsec support …
From secure business process modeling to design-level security verification
Tracing and integrating security requirements throughout the development process is a key
challenge in security engineering. In socio-technical systems, security requirements for the …
challenge in security engineering. In socio-technical systems, security requirements for the …
A mastery-based learning approach for undergraduate engineering programs
JM Bekki, O Dalrymple, CS Butler - 2012 Frontiers in Education …, 2012 - ieeexplore.ieee.org
We report the results of an action research study in which a modified mastery-based
learning approach was implemented in three undergraduate engineering courses …
learning approach was implemented in three undergraduate engineering courses …
Towards model-based communication control for the Internet of Things
Abstract Most of existing Model-Driven Engineering (MDE) approaches for the Internet of
Things (IoT) focus on means of modeling the behavior of end devices. Little attention has …
Things (IoT) focus on means of modeling the behavior of end devices. Little attention has …
Towards model-based development of decentralised peer-to-peer data vaults
Using centralised data storage systems has been the standard practice followed by online
service providers when managing the personal data of their users. This method requires …
service providers when managing the personal data of their users. This method requires …
[PDF][PDF] From Secure Business Process Modeling to Design-Level Security Verification (long version)
Tracing and integrating security requirements throughout the development process is a key
challenge in security engineering. In socio-technical systems, security requirements for the …
challenge in security engineering. In socio-technical systems, security requirements for the …
Vaultage: automatic generation of secure communication around decentralised user-managed data vaults
The storage of user data in centralised systems is a standard procedure followed by online
service providers such as social networks. This requires users to trust these providers, and …
service providers such as social networks. This requires users to trust these providers, and …
Data Protection Assurance by Design: Support for Conflict Detection, Requirements Traceability and Fairness Analysis
Q Ramadan - 2020 - kola.opus.hbz-nrw.de
Data-minimization and fairness are fundamental data protection requirements to avoid
privacy threats and discrimination. Violations of data protection requirements often result …
privacy threats and discrimination. Violations of data protection requirements often result …