Charting Transformation through Security


Book Description

This book analyses security cooperation in the domain of inter-regionalism, addressing the emergence of the African Union as a regional actor and its impact on EU-Africa relations. It explores the transformative potential of security cooperation for equality, partnership and local ownership in EU-Africa relations.




Graph and Model Transformation


Book Description

This book is a comprehensive explanation of graph and model transformation. It contains a detailed introduction, including basic results and applications of the algebraic theory of graph transformations, and references to the historical context. Then in the main part the book contains detailed chapters on M-adhesive categories, M-adhesive transformation systems, and multi-amalgamated transformations, and model transformation based on triple graph grammars. In the final part of the book the authors examine application of the techniques in various domains, including chapters on case studies and tool support. The book will be of interest to researchers and practitioners in the areas of theoretical computer science, software engineering, concurrent and distributed systems, and visual modelling.




Graph Transformation


Book Description

This book constitutes the proceedings of the 6th International Conference on Graph Transformations, ICGT 2012, held in Bremen, Germany, in September 2012. The 30 papers and 3 invited papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on behavioural analysis, high-level graph transformation, revisited approaches, general transformation models, structuring and verification, graph transformations in use, (meta-)model evolution and incremental approaches.




Graph Transformations


Book Description

This book constitutes the refereed proceedings of the Second International Conference on Graph Transformation, ICGT 2004, held in Rome, Italy, in September/October 2004. The 26 revised full papers presented together with three invited contributions and summaries of 2 tutorials and 5 workshops were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on integration technology, chemistry and biology, graph transformation concepts, DPO theory for high-level structures, analysis and testing, graph theory and algorithms, application conditions and logic, transformation of special structures, and object-orientation.




Graph Transformation


Book Description

ICGT 2002 was the ?rst International Conference on Graph Transformation following a series of six international workshops on graph grammars with - plications in computer science, held in Bad Honnef (1978), Osnabruc ̈ k (1982), Warrenton (1986), Bremen (1990), Williamsburg (1994), and Paderborn (1998). ICGT 2002 was held in Barcelona (Spain), October 7–12, 2002 under the a- pices of the European Association of Theoretical Computer Science (EATCS), the European Association of Software Science and Technology (EASST), and the IFIP Working Group 1.3, Foundations of Systems Speci?cation. The scope of the conference concerned graphical structures of various kinds (like graphs, diagrams, visual sentences and others) that are useful to describe complex structures and systems in a direct and intuitive way. These structures are often augmented by formalisms which add to the static description a further dimension, allowing for the modeling of the evolution of systems via all kinds of transformations of such graphical structures. The ?eld of Graph Transformation is concerned with the theory, applications, and implementation issues of such formalisms. The theory is strongly related to areas such as graph theory and graph - gorithms, formal language and parsing theory, the theory of concurrent and distributed systems, formal speci?cation and veri?cation, logic, and semantics.




Graph Transformation


Book Description




Theorizing the European Neighbourhood Policy


Book Description

Despite growing scholarly interest in the EU’s flagship policy towards its Eastern and Southern neighbours, serious attempts at theory-building on the European Neighbourhood Policy (ENP) have been largely absent from the academic debate. This book aims at contributing to fill this research gap in a three-fold manner: first and foremost it aims at theorizing the ENP as such, explaining the origins, development and effectiveness of this policy. Building on this effort, it also pursues the broader objective of addressing certain shortcomings in EU external relations theory, and even beyond, in International Relations theory. Finally, it aspires to provide new insights for European policy-makers. It is one of the first volumes to provide different theoretical perspectives on the ENP by revisiting and building bridges between mainstream and critical theories, stimulating academic and policy debates and thus setting a novel, less EU-centric research agenda. This text will be of key interest to scholars, students and practitioners in EU external relations, EU foreign policy, the European Neighbourhood Policy, and more broadly in European Union Politics and International Relations.




Security Compliance in Model-driven Development of Software Systems in Presence of Long-Term Evolution and Variants


Book Description

For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the implementation or among themselves. An additional burden are variants of software systems. To ensure security in this context, we present an approach based on continuous automated change propagation, allowing security experts to specify security requirements on the most suitable system representation. We automatically check all system representations against these requirements and provide security-preserving refactorings for preserving security compliance. For both, we show the application to variant-rich software systems. To support legacy systems, we allow to reverse-engineer variability-aware UML models and semi-automatically map existing design models to the implementation. Besides evaluations of the individual contributions, we demonstrate the approach in two open-source case studies, the iTrust electronics health records system and the Eclipse Secure Storage.




Africa-Europe Research and Innovation Cooperation


Book Description

This book is open access under a CC BY 4.0 license. This edited volume is concerned with the evolution and achievements of cooperation in research and innovation between Africa and Europe, and points to the need for more diversified funding and finance mechanisms, and for novel models of collaboration to attract new actors and innovative ideas. It reflects on the political, economic, diplomatic and scientific rationale for cooperation, while also examining practical developments, illustrated with examples, in the fields of food security, health, and climate change. The need to mobilise scientific knowledge and to ensure equality and fairness in the cooperation are recurrent themes. Africa-Europe Cooperation in Research and Innovation is essential reading for policy makers and researchers in international relations and science diplomacy.




Democratic Legitimacy in the European Union and Global Governance


Book Description

This book addresses one of the most relevant challenges to the sustainability of the European Union (EU) as a political project: the deficit of citizens’ support. It identifies missing elements of popular legitimacy and makes proposals for their formal inclusion in a future Treaty reform, while assessing the contribution that the EU may make to global governance by expanding a credible democratic model to other international actors. The contributors offer perspectives from law, political science, and sociology, and the 15 case studies of different aspects of the incipient European demos provide the reader with a comprehensive overview of these pertinent questions. The edited volume provides a truly interdisciplinary study of the citizens’ role in the European political landscape that can serve as a basis for further analyses of the EU’s democratic legitimacy. It will be of use to legal scholars and political scientists interested in the EU’s democratic system, institutional setup and external relations.