Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Legacy systems are usually made of two kind of artifacts: source code and databases. Typically, the maintenance of those systems is carried out through re-engineering processes. Although both artifacts can be independently maintained, for a more effective re-engineering of the whole system both should be analyzed and evolved jointly. This is mainly due to the fact that the knowledge expected to be...
There is a real need for SOA principles, such as those offering software as services, in the software industry. In this effort, databases (one of the most important artifacts in information systems) can be also seen as a set of services offering access to the stored information. This paper presents PRECISO, a reverse engineering tool to discover and generate Web services automatically from relational...
Information security is a crucial aspect for enterprises that has to be considered as a strong requirement from the early stages of the development process and data warehouses (DWs) manage highly important information used to make strategic decisions which has to be protected from unauthorized users. In order to develop secure DWs we have proposed a model driven architecture (MDA) composed of several...
Data warehouses (DWs) manage crucial information for enterprises which must be protected from unauthorized accesses. The question of which security issues are present in all stages of the DW design is therefore of great importance when considering these security constraints in design decisions. We have used the model driven architecture (MDA) approach to propose an MDA architecture with which to develop...
Database reverse engineering in general has only been used to recover the conceptual schema employed during its construction. To the best of our knowledge, none of this work has made use of that static structure to perform a deep analysis to infer functionality, or in other words, services over data that could be offered via Web services. Our work goes beyond the discovery of functionality, generating...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.