Group: de.uni.freiburg.iig.telematik - All Dependencies

icon
JAGAL 1.0.2

JAGAL: Java Graph Library · JAGAL provides implementations for directed graphs (weighted and unweighted) and various types of transition systems as well as utils for graph traversal and modification.

Jan 22, 2016
2 usages
0 stars
icon
SEWOL 1.0.2

SEWOL: Security-oriented Workflow Lib · SEWOL provides support for the handling of workflow traces. Specifically it allows to specify the shape and content of process traces in terms of entries representing the execution of a specific workflow activity. SEWOL also allows to write these traces on disk as a log file with the help of a special file writer for process logs. Currently it supports plain text, Petrify, MXML and XES log file types. In order to specify security-related context information, SEWOL provides access control models such as access control lists (ACL) and role-based access control models (RBAC). All types of models can be conveniently edited with the help of appropriate dialogs.

Jan 22, 2016
1 usages
0 stars
icon
tools 1.0.2

Tools: Parent of JAGAL, SEWOL and SEPIA · Our tools form the base for the security workflow analysis toolkit SWAT and the Petri net editor Wolfgang.

Jan 22, 2016
0 stars
icon
TOVAL 1.0.0

TOVAL: Toms Java Library · TOVAL comprises a set of java classes for common programming issues. It includes utils for arrays, lists, sets and collections for convenient handling and modification, but also support for mathematic definitions concerning logic (clauses + resolution) together with some algorithms for permutations, powersets and resolution. Additionally it contains a number of types for multisets, matrices with object keys and much more.

Jul 29, 2015
0 stars
icon
SEPIA 1.0.2

SEPIA: Security-oriented PN Framework · SEPIA provides implementations for various types of Petri nets. Along Place/Transition-nets, it supports Petri nets with distinguishable token colors and defines coloured workflow nets, where coloured tokens are interpreted as data elements used during process execution. To support information flow analysis of processes, SEPIA defines so-called IF-Nets, tailored for security-oriented workflow modeling which enable users to assign security-levels (HIGH, LOW) to transitions, data elements and persons/agents participating in the process execution.

Jan 22, 2016
2 stars

Advertisement

Top Dependency Usages

Feb 13, 2021
95.1k usages
8.4k stars
Jun 02, 2023
69.4k usages
14.2k stars
Mar 17, 2023
51k usages
2.1k stars
Jul 31, 2023
27.1k usages
49k stars
Aug 09, 2023
25k usages
2.7k stars