Buscar
Mostrando ítems 1-3 de 3
Artículo
CyberSPL: Framework for the verification of cybersecurity policy compliance of system configurations using software product lines
(MDPI, 2019)
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations. Such disadvantages may be due to the absence of security configurations or the use of default configuration values of software ...
Ponencia
Process Mining to Unleash Variability Management: Discovering Configuration Workflows Using Logs
(Association for Computing Machinery (ACM), 2019)
Variability models are used to build configurators. Configurators are programs that guide users through the configuration process to reach a desired configuration that fulfils user requirements. The same variability ...
Ponencia
Towards a New Repository for Feature Model Exchange
(ACM: Association for Computing Machinery, 2019)
Feature models are one of the most important contributions to the field of software product lines, feature oriented software develop ment or variability intensive systems. Since their invention in 1990, many feature model ...