With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, security demands a tight regime on permissions; on the other hand, users need permissions to perform their tasks. Role-based access control (RBAC) has proven to be a solution to this… (More)
While the importance of multi-tier architectures for enterpriseinformation systems is widely accepted and theirbenefits are well published, the systematic migration frommonolithic legacy systems toward multi-tier architectures isknown to a much lesser extent. In this paper we present apattern on how to re-use elements of legacy systems withinmulti-tier… (More)
The transition from traditional paper libraries to digital libraries enables new strategies for the use and maintenance of artifact collections. Distributed software development can be regarded as a special case of digital library utilization, where developers or groups of developers are working on the same software geographically dispersed in time zones… (More)
Common object models select method implementations based on the class of the receiver. If an object belongs to several classes, more than one implementation is applicable for a method call. We present a conflict resolution strategy to get exactly one implementation per call. This is achieved by adding derived classes with method redefinitions.
In most object-oriented systems, references are the only way to express the coupling of objects. They deene the visibility among objects, associations of objects, and often lifetime dependencies. We present a relationship construct that separates these three issues, thereby allowing to reduce dependencies and enhance potential parallelism. In this paper, we… (More)
spezifiziert werden, so soll das die Verifikation unterstützen, nicht die Optimierung; letzere bleibt – abgesehen von low-level-Optimierungen – dem Programmiererüberlassen. Zugunsten all