Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements
  • Language: en
  • Pages: 412

Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.

Context-based Access Control and Attack Modelling and Analysis
  • Language: en
  • Pages: 350

Context-based Access Control and Attack Modelling and Analysis

This work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control policies and vulnerabilities, often analyzed separately, into a unified approach using software architecture models. Contributions include metamodels for access control and vulnerabilities, scenario-based analysis, and two attack analyses. Evaluation demonstrates high accuracy in identifying issues for secure system development.

Architectural Alignment of Access Control Requirements Extracted from Business Processes
  • Language: en
  • Pages: 366

Architectural Alignment of Access Control Requirements Extracted from Business Processes

Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.

Digital Transformation
  • Language: en
  • Pages: 522

Digital Transformation

Digital Transformation in Industry 4.0/5.0 requires the effective and efficient application of digitalization technologies in the area of production systems. This book elaborates on concepts, techniques, and technologies from computer science in the context of Industry 4.0/5.0 and demonstrates their possible applications. Thus, the book serves as an orientation but also as a reference work for experts in the field of Industry 4.0/5.0 to successfully advance digitization in their companies.

Managed Software Evolution
  • Language: en
  • Pages: 426

Managed Software Evolution

  • Type: Book
  • -
  • Published: 2019-06-26
  • -
  • Publisher: Springer

This open access book presents the outcomes of the “Design for Future – Managed Software Evolution” priority program 1593, which was launched by the German Research Foundation (“Deutsche Forschungsgemeinschaft (DFG)”) to develop new approaches to software engineering with a specific focus on long-lived software systems. The different lifecycles of software and hardware platforms lead to interoperability problems in such systems. Instead of separating the development, adaptation and evolution of software and its platforms, as well as aspects like operation, monitoring and maintenance, they should all be integrated into one overarching process. Accordingly, the book is split into thr...

Software Architecture
  • Language: en
  • Pages: 225

Software Architecture

This book constitutes the refereed proceedings of the 16th International Conference on Software Architecture, ECSA 2022, held in Prague in September 2022. The 9 full papers and 6 short papers were carefully selected from 47 submissions. In the Research Track, 11 full papers presented together with 5 short papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections as follows: components, APIs and interface management; architecting for data-driven systems; microservices and middleware; architecture modeling, design and decision making; architecture reconstruction and recovery.

Software Architecture
  • Language: en
  • Pages: 370

Software Architecture

This book constitutes the refereed proceedings of the 14th International Conference on Software Architecture, ECSA 2020, held in A’quila, Italy, in September 2020. In the Research Track, 12 full papers presented together with 5 short papers were carefully reviewed and selected from 103 submissions. They are organized in topical sections as follows: microservices; uncertainty, self-adaptive, and open systems; model-based approaches; performance and security engineering; architectural smells and source code analysis; education and training; experiences and learnings from industrial case studies; and architecting contemporary distributed systems. In the Industrial Track, 11 submissions were received and 6 were accepted to form part of these proceedings. In addition the book contains 3 keynote talks. Due to the Corona pandemic ECSA 2020 was held as an virtual event.

Architecture-based Evolution of Dependable Software-intensive Systems
  • Language: en
  • Pages: 154

Architecture-based Evolution of Dependable Software-intensive Systems

This cumulative habilitation thesis, proposes concepts for (i) modelling and analysing dependability based on architectural models of software-intensive systems early in development, (ii) decomposition and composition of modelling languages and analysis techniques to enable more flexibility in evolution, and (iii) bridging the divergent levels of abstraction between data of the operation phase, architectural models and source code of the development phase.

Mensch und Computer 2015 – Workshopband
  • Language: en
  • Pages: 842

Mensch und Computer 2015 – Workshopband

The Workshop Volume from the Humans and Computers Conference documents the advanced tutorials that were presented to deepen the understanding gained from the conference lectures. It presents case studies along with accompanying exercises.