𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[ACM Press the twenty-second IEEE/ACM international conference - Atlanta, Georgia, USA (2007.11.05-2007.11.09)] Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering - ASE '07 - Checking threat modeling data flow diagrams for implementation conformance and security

✍ Scribed by Abi-Antoun, Marwan; Wang, Daniel; Torr, Peter


Book ID
120707034
Publisher
ACM Press
Year
2007
Tongue
English
Weight
285 KB
Category
Article
ISBN
1595938826

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


[ACM Press the twenty-second IEEE/ACM in
[ACM Press the twenty-second IEEE/ACM in
✍ Xiong, Yingfei; Liu, Dongxi; Hu, Zhenjiang; Zhao, Haiyan; Takeichi, Masato; Mei, πŸ“‚ Article πŸ“… 2007 πŸ› ACM Press 🌐 English βš– 389 KB

The metamodel techniques and model transformation techniques provide a standard way to represent and transform data, especially the software artifacts in software development. However, after a transformation is applied, the source model and the target model usually co-exist and evolve independently.