@article {10001634720141101, title = {A Graph Based Approach to Trace Models Composition.}, journal = {Journal of Software (1796217X)}, volume = {9}, number = {11}, year = {2014}, pages = {2813 - 2822}, abstract = {A model driven engineering process involves different and heterogeneous models that represent various perspectives of the system under development. The model composition operation allows combining those sub-models into an integrated view, but remains a tedious activity. For that, traceability information must be maintained to comprehend the composition effects and better manage the operation itself. Against this context, the current paper describes a framework for model composition traceability. We consider the traces generation concern as a crosscutting concern where the weaving mechanism is performed using graph transformations. A composition specification case study is presented to illustrate our contribution. [ABSTRACT FROM AUTHOR]}, keywords = {aspect oriented modeling, Computer engineering, Computer simulation, Graph theory, graph transformation, Heterogeneous computing, Information theory, model composition, model transformation, traceability}, issn = {1796217X}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=100016347\&site=ehost-live}, author = {Laghouaouta, Youness and Anwar, Adil and Nassar, Mahmoud and Coulette, Bernard} } @article {8999329020120801, title = {Ing{\'e}nierie des exigences de la s{\'e}curit{\'e} informatique: Revue de travaux de recherche de l{\textquoteright}{\'e}licitation {\`a} la sp{\'e}cification.}, journal = {E-Ti: E-Review in Technologies Information}, number = {6}, year = {2012}, pages = {17 - 31}, abstract = {Nowadays Security plays an important role in the development of applications because of network expansion on one side and of the importance of information on the other side. However, security requirements have long been relegated to second place compared to the functional requirements which can cause some damage to the applications. One of the challenges of current research in the area of requirement engineering is to develop simple, expressive, reliable and costless methods for expressing and modelling security requirements. One of the challenges of current research in the area of requirement engineering is to develop simple, expressive, reliable and costless methods for expressing and modelling security requirements. (English) [ABSTRACT FROM AUTHOR]}, keywords = {Computer networks, Computer security, Computer software development, Elicitation, Formal Specification, Framework de mod{\'e}lisation, Information theory, Ing{\'e}nierie des exigences, Modelling framework, Requirement Engineering, Requirements engineering, S{\'e}curit{\'e}, Security, Sp{\'e}cification formelle}, issn = {11148802}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=89993290\&site=ehost-live}, author = {Kassou, Meryem and Kjiri, Laila} }