JH Hoepman - IFIP International Information Security Conference, 2014 - Springer
In this paper we define the notion of a privacy design strategy. These strategies help IT architects to support privacy by design early in the software development life cycle, during …
CONTEXT: Knowledge management technologies have been employed across software engineering activities for more than two decades. Knowledge-based approaches can be …
The aim of this chapter is to identify the role of enterprise architecture, and more specifically, the role of architecture principles. It starts with an exploration of the concept of enterprise …
A Jansen, J Bosch - 5th Working IEEE/IFIP Conference on …, 2005 - ieeexplore.ieee.org
Software architectures have high costs for change, are complex, and erode during evolution. We believe these problems are partially due to knowledge vaporization. Currently, almost all …
SA Aljawarneh, A Alawneh, R Jaradat - Future Generation Computer …, 2017 - Elsevier
Security vulnerabilities and defects are results of poorly constructed software that can lead to easy exploitation by the cyber criminals. A large number of Cloud software systems are …
Architectural knowledge consists of architecture design as well as the design decisions, assumptions, context, and other factors that together determine why a particular solution is …
Context: With an increase in Agile, Lean, and DevOps software methodologies over the last years (collectively referred to as Continuous Software Development (CSD)), we have …
A software architecture manifests the major early design decisions. These early decisions determine the system's development, deployment and evolution. Thus, making better …
H Van Vliet, A Tang - Journal of Systems and Software, 2016 - Elsevier
Traditionally, software architecture is seen as the result of the software architecture design process, the solution, usually represented by a set of components and connectors. Recently …