Mapping Study on Constraint Consistency Checking in Distributed Enterprise Systems
暂无分享,去创建一个
Miroslav Bures | Tomas Cerny | Vincent Bushong | Karel Frajtak | Pavel Tisnovsky | Dipta Das | Jan Svacina | Andrew Walker | T. Cerný | Miroslav Bures | J. Svacina | Vincent Bushong | Dipta Das | Karel Frajták | Pavel Tisnovsky | Andrew Walker
[1] Liming Wang,et al. DeaPS: Deep Learning-Based User-Level Proactive Security Auditing for Clouds , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[2] B. J. Ferro Castro,et al. Pattern-Oriented Software Architecture: A System of Patterns , 2009 .
[3] Cristina V. Lopes,et al. SourcererCC: Scaling Code Clone Detection to Big-Code , 2015, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[4] Michael J. Donahoo,et al. Contextual understanding of microservice architecture: current and future directions , 2018, SIAP.
[5] Miroslav Bures,et al. On Matching Log Analysis to Source Code: A Systematic Mapping Study , 2020, RACS.
[6] Miroslav Bures,et al. Failure Prediction by Utilizing Log Analysis: A Systematic Mapping Study , 2020, RACS.
[7] Alexander Egyed,et al. Efficient detection of inconsistencies in a multi-developer engineering environment , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).
[8] Miroslav Bures,et al. Aspects of Quality in Internet of Things (IoT) Solutions: A Systematic Mapping Study , 2019, IEEE Access.
[9] Ying Zou,et al. Enhancing Source-Based Clone Detection Using Intermediate Representation , 2010, 2010 17th Working Conference on Reverse Engineering.
[10] Miroslav Bures,et al. On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices , 2020, IEEE Access.
[11] Nour Ali,et al. Towards Micro Service Architecture Recovery: An Empirical Study , 2018, 2018 IEEE International Conference on Software Architecture (ICSA).
[12] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[13] José Carlos Bregieiro Ribeiro,et al. Using dynamic analysis of Java bytecode for evolutionary object-oriented unit testing , 2007 .
[14] Ernesto Damiani,et al. Test-Based Security Certification of Composite Services , 2018, ACM Trans. Web.
[15] Albert Zündorf,et al. A Modeling Method for Systematic Architecture Reconstruction of Microservice-Based Software Systems , 2020, BPMDS/EMMSAD@CAiSE.
[16] Atif Mashkoor,et al. Live and global consistency checking in a collaborative engineering environment , 2019, SAC.
[17] Vitaly Shmatikov,et al. Fix Me Up: Repairing Access-Control Bugs in Web Applications , 2013, NDSS.
[18] Maurizio Talamo,et al. Online and offline conformance checking of inter-organizational business processes with incomplete process logs , 2016, 2016 IEEE International Carnahan Conference on Security Technology (ICCST).
[19] Martin Fowler,et al. Patterns of Enterprise Application Architecture , 2002 .
[20] C. Martin. 2015 , 2015, Les 25 ans de l’OMC: Une rétrospective en photos.
[21] Kai Petersen,et al. Guidelines for conducting systematic mapping studies in software engineering: An update , 2015, Inf. Softw. Technol..
[22] Bin Liang,et al. Digging Evidence for Violation of Cloud Security Compliance with Knowledge Learned from Logs , 2018, Communications in Computer and Information Science.
[23] Feifei Li,et al. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.
[24] Miroslav Bures,et al. On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends , 2020, RACS.
[25] Yongwang Zhao,et al. A Constraint Mechanism for Dynamic Evolution of Service Oriented Systems , 2012, 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing.
[26] Vitaly Shmatikov,et al. A security policy oracle: detecting security holes using multiple API implementations , 2011, PLDI '11.
[27] Jan Svacina,et al. On Automated Role-Based Access Control Assessment in Enterprise Systems , 2019 .
[28] Choirul Anam,et al. Conventional Software Testing Using White Box Method , 2018 .
[29] Chanchal Kumar Roy,et al. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach , 2009, Sci. Comput. Program..
[30] Maninder Singh,et al. Software clone detection: A systematic review , 2013, Inf. Softw. Technol..
[31] Yueming Lu,et al. A Method of Conflict Detection for Security Policy Based on B+ Tree , 2019, 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC).
[32] Marko Vukolic,et al. Towards property-based consistency verification , 2016, PaPoC@EuroSys.
[33] Wolfgang Emmerich,et al. Flexible consistency checking , 2003, TSEM.
[34] Maurizio Talamo,et al. Conformance checking of electronic business processes to secure distributed transactions , 2013, 2013 47th International Carnahan Conference on Security Technology (ICCST).
[35] Rajshekhar Sunderraman,et al. A mobile agent approach for global database constraint checking , 2004, SAC '04.
[36] K. Senthil Kumar,et al. A Novel Method to Find Time Complexity of an Algorithm by Using Control Flow Graph , 2017, 2017 International Conference on Technical Advancements in Computers and Communications (ICTACC).
[37] Hélène Kirchner,et al. Secure interoperation design in multi-domains environments based on colored Petri nets , 2013, Inf. Sci..