Learn More
We report on a combination of system theoretic simulation modeling methodology with the JavaBeans component model as a basis for a component-based simulation framework. While system theory formalisms can serve as formal, mathematical foundations for modular, hierarchical modeling and simulation, the JavaBeans component model provides the appropriate(More)
Security design patterns are proven solutions to security problems in a given context with constructive measures of how to design certain parts of a software system. The literature contains numerous definitions, examples , and taxonomies of such patterns. There are also a few quality criteria for them. We suggest a new taxonomy based on attack patterns in(More)
The automatic extraction of high-level structural information from code is important for both software maintenance and reuse. Instead of using special-purpose tools, we explore the use of a general-purpose data visualization system called Hy+ for querying and visualizing information about object-oriented software systems. Hy+ supports visualization and(More)
This paper describes a tool that helps programmers understand object-oriented software systems written in C++, a language that is expected to gain widespread use in industry. This task is accomplished by providing information about the set of classes and files comprising the system and the relationships among them. The tool described enables its users to(More)
The evolution of complex software systems is promoted by software engineering principles and techniques like separation of concerns, encapsulation, stepwise refinement, and reusability of design solutions. Design patterns capture the expertise for reusable design solutions. Aspect-oriented programming is a methodology that enables the modulari-zation of(More)
Object-oriented programming improves the reusability of software components. Extensive reuse of existing software enhances the importance of documentation. To increase productivity in documenting and to make the structure of documentation better suitable for object-oriented software systems, we suggest applying object-oriented technology to the(More)
Typically, users of Web content management systems lack expert knowledge of the technology itself, let alone the security issues therein. Complicating the matter, WCMS vulnerabilities are attractive targets for potential attackers. A security analysis of two popular, open-source WCMSs exposed significant security holes, despite the obvious efforts of their(More)