Zobrazeno 1 - 10
of 108
pro vyhledávání: '"Stephan Fassbender"'
Publikováno v:
International Journal of Secure Software Engineering. 6:24-46
To benefit from cloud computing and the advantages it offers, obstacles regarding the usage and acceptance of clouds have to be cleared. For cloud providers, one way to obtain customers' confidence is to establish security mechanisms when using cloud
Autor:
Stephan Faßbender, Azadeh Alebrahim, Uwe Zdun, Martin Filipczyk, Maritta Heisel, Michael Goedicke
Variability is a key factor of most systems. While there are many works covering variability in functionality, there is a research gap regarding variability in software qualities. There is an obvious imbalance between the importance of variability in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::781257c371b3302cdbea72844a50b014
Autor:
Stephan Faßbender, Azadeh Alebrahim, Maritta Heisel, Martin Filipczyk, Michael Goedicke, Uwe Zdun
Publikováno v:
ECSA Workshops
To benefit from cloud computing and the advantages it offers, obstacles regarding the usage and acceptance of clouds have to be cleared. For cloud providers, one way to obtain customers' confidence is to establish security mechanisms when using cloud
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f3ed86f2dbaf2e37affff76e13331a6c
Publikováno v:
EuroPLoP
The software architecture of a system-to-be affects the fulfillment of the desired quality requirements for this system. For building upon common knowledge and best practices, the use of architectural patterns in the software architecture has shown t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1403837145673254e806e17d70df737c
Publikováno v:
Communications in Computer and Information Science ISBN: 9783319255781
ICSOFT (Selected Papers)
ICSOFT (Selected Papers)
Recently published reports on cybercrime indicate an ever-increasing number of security incidents related to IT systems. Many attacks causing the incidents abuse (in)directly one or more security defects. Fixing the security defect once fielded is co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6697ca3a8c546d2296d9a56765a25b79
https://doi.org/10.1007/978-3-319-25579-8_18
https://doi.org/10.1007/978-3-319-25579-8_18
Publikováno v:
Communications in Computer and Information Science ISBN: 9783319255781
ICSOFT (Selected Papers)
ICSOFT (Selected Papers)
Requirements engineers not only have to cope with the requirements of various stakeholders for complex software systems, they also have to consider several software qualities (e.g., performance, maintainability, security, and privacy) that the system
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::86c45208439228f7f60b37526cbc8afd
https://doi.org/10.1007/978-3-319-25579-8_17
https://doi.org/10.1007/978-3-319-25579-8_17
Publikováno v:
EuroPLoP
In a previous EuroPlop publication we introduced a catalog of context-patterns. We described common structures and stakeholders for several different domains in our context-patterns. The common elements of the context were obtained from observations
Publikováno v:
EuroPLoP
In a previous publication we introduced a catalog of context-patterns. Each context pattern describes common structures and stakeholders for a specific domain. The common elements of the context were obtained from observations about the domain in ter
Autor:
Stephan Faßbender, Christos Kalloniatis, Stefanos Gritzalis, Rene Meis, Kristian Beckers, Maritta Heisel
Publikováno v:
Trust, Privacy, and Security in Digital Business ISBN: 9783319097695
TrustBus
TrustBus
Nowadays, IT-resources are often out-sourced to clouds to reduce administration and hardware costs of the own IT infrastructure. There are different deployment scenarios for clouds that heavily differ in the costs for deployment and maintenance, but
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a5a4d1ff49952bbba54eba5a15e77216