Restoring security of evolving software models using graph transformation.
Jens BürgerJan JürjensSven WenzelPublished in: Int. J. Softw. Tools Technol. Transf. (2015)
Keyphrases
- graph transformation
- probabilistic model
- software design
- software components
- access control
- computer systems
- parameter estimation
- security requirements
- software maintenance
- computational models
- information security
- complex systems
- social networks
- software development
- source code
- prior knowledge
- multi agent systems
- case study