Model-driven reverse engineering approaches: A systematic literature review

C Raibulet, FA Fontana, M Zanoni - Ieee Access, 2017 - ieeexplore.ieee.org
This paper explores and describes the state of the art for what concerns the model-driven
approaches proposed in the literature to support reverse engineering. We conducted a …

A feature-based survey of model view approaches

H Bruneliere, E Burger, J Cabot, M Wimmer - Software & Systems …, 2019 - Springer
When dealing with complex systems, information is very often fragmented across many
different models expressed within a variety of (modeling) languages. To provide the relevant …

Model-based security analysis of feature-oriented software product lines

S Peldszus, D Strüber, J Jürjens - Proceedings of the 17th ACM …, 2018 - dl.acm.org
Today's software systems are too complex to ensure security after the fact–security has to be
built into systems by design. To this end, model-based techniques such as UMLsec support …

From secure business process modeling to design-level security verification

Q Ramadan, M Salnitriy, D Strüber… - 2017 ACM/IEEE 20th …, 2017 - ieeexplore.ieee.org
Tracing and integrating security requirements throughout the development process is a key
challenge in security engineering. In socio-technical systems, security requirements for the …

A mastery-based learning approach for undergraduate engineering programs

JM Bekki, O Dalrymple, CS Butler - 2012 Frontiers in Education …, 2012 - ieeexplore.ieee.org
We report the results of an action research study in which a modified mastery-based
learning approach was implemented in three undergraduate engineering courses …

Towards model-based communication control for the Internet of Things

I Berrouyne, M Adda, JM Mottu, JC Royer… - … and Foundations: STAF …, 2018 - Springer
Abstract Most of existing Model-Driven Engineering (MDE) approaches for the Internet of
Things (IoT) focus on means of modeling the behavior of end devices. Little attention has …

Towards model-based development of decentralised peer-to-peer data vaults

A Yohannis, A De La Vega, D Kahrobaei… - Proceedings of the 23rd …, 2020 - dl.acm.org
Using centralised data storage systems has been the standard practice followed by online
service providers when managing the personal data of their users. This method requires …

[PDF][PDF] From Secure Business Process Modeling to Design-Level Security Verification (long version)

Tracing and integrating security requirements throughout the development process is a key
challenge in security engineering. In socio-technical systems, security requirements for the …

Vaultage: automatic generation of secure communication around decentralised user-managed data vaults

A Yohannis, A Vega Ruiz, D Kolovos - 2022 - repositorio.unican.es
The storage of user data in centralised systems is a standard procedure followed by online
service providers such as social networks. This requires users to trust these providers, and …

Data Protection Assurance by Design: Support for Conflict Detection, Requirements Traceability and Fairness Analysis

Q Ramadan - 2020 - kola.opus.hbz-nrw.de
Data-minimization and fairness are fundamental data protection requirements to avoid
privacy threats and discrimination. Violations of data protection requirements often result …