The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The architecture of a software system is result of architectural design decisions, where architects select among alternatives (architectural tactics) and software components when a stakeholders business objective is demanded. However, thereis not evidence of framework that conducts the appropriateselection of software components using architectural tactics. In this paper we present a PhD research...
The architecture of a software system is consequence of a succession of architectural design decisions. This kind of decision allows to software architect select alternatives (architecture tactics) and software components when a stakeholders requirement is demanded. However, there is no framework that conducts the appropriate selection of software components using architectural tactics. This article...
Today, the constant evolution of the technology has enabled people to access information which were not possible before. The concept of Internet of Things (IoT) is a new step of processing information technology, which allows people to understand about their environment and how they can control the variables that affect their lives. One of these variables is to handle events that occur within houses...
The development of secure software systems is an increasingly important research topic in software engineering. Several authors have proposed methods, techniques and tools to software development practices in order to identify and/or mitigate security threats. These methods and techniques are based in traditional software engineering artifacts, such as Use Cases, Activity Diagrams and Domain Models...
Business Processes are an important resource for performance on business competitiveness. The Business Process descriptions made; with BPMN (Business Process Modelling Notation), the de facto standard in the market, can be translated into execution languages; such as BPEL (Business Process Execution Language). Originally, BPMN specification does not include the representation of security aspects....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.