Modeling behavioral deontic constraints using UML and OCL

A Vallecillo, M Gogolla - International Conference on Conceptual …, 2020 - Springer
Business rules specify the required or desirable states of affairs or behavior of IT systems,
and typically involve deontic constraints that must be adequately specified to enable their …

Preservation of policy adherence under refinement

B Solhaug, K Stølen - 2009 - sintef.brage.unit.no
Policy-based management is an approach to the management of systems with respect to
issues such as security, access control and trust by the enforcement of policy rules. This …

Policy specification using sequence diagrams. Applied to trust management

B Solhaug - 2009 - bora.uib.no
With the ever increasing importance of computer networks such as the Internet, and the
today almost ubiquitous online services, the needs for themanagement of these networks …

Sequence Diagram Aided Privacy Policy Specification

H Shen, R Krishnan, R Slavin… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
A fundamental problem in the specification of regulatory privacy policies such as the Health
Insurance Portability and Accountability Act (HIPAA) in a computer system is to state the …

A framework for analyzing and monitoring the impact of dependencies on quality

OS Ligaarden - 2013 - duo.uio.no
In today's society, we are dependent on a number of services provided by interconnected
systems. These services may be anything from electricity to services provided by social …

Experiences from using a UML-based method for trust analysis in an industrial project on electronic procurement

TV Håvaldsrud, OS Ligaarden, P Myrseth… - Electronic Commerce …, 2010 - Springer
This paper reports on experiences from using a UML-based method for trust analysis in an
industrial project. The overall aim of the trust analysis method is to provide a sound basis for …

[PDF][PDF] Policy Specification Using Sequence Diagrams

B Solhaug - 2009 - breibakk.no
With the ever increasing importance of computer networks such as the Internet, and the
today almost ubiquitous online services, the needs for the management of these networks …

[PDF][PDF] Collaborative Modeling for Integrating Security Properties on a Medical Sharing Application

C NEMO, M BLAY-FORNARINO, E MODALIS - rapport, juillet, 2009 - researchgate.net
The UML is the de facto standard for system specification. But how does it support the
specification, analysis and integration of concerns? In this technical report, we study (1) the …

A New Code Generation Method for Software Engineering: From Requirements Model to Source Code

B Huang, Z Fang, G Wu, X Sun… - New Trends in Intelligent …, 2017 - ebooks.iospress.nl
Abstract the existing software engineering techniques for software synthesis from
requirements model to source code have many limitations. The synthesis approach shows …

[PDF][PDF] Analyse av tillit i elektronisk samvirke

A Refsdal - sintef.no
Dependent CORAS Page 1 ICT Analyse av tillit i elektronisk samvirke Atle Refsdal SINTEF IKT
Page 2 ICT 2 Oversikt ∎ Tillit ∎ Hvorfor analysere tillit? ∎ Tillit i elektronisk samvirke ∎ Tillit og …