Multi-tenancy helps service providers to save costs, improve resource utilization, and reduce service customization and maintenance time by sharing of resources and services. On the other hand, supporting multi-tenanc...
详细信息
ISBN:
(纸本)9781467328920
Multi-tenancy helps service providers to save costs, improve resource utilization, and reduce service customization and maintenance time by sharing of resources and services. On the other hand, supporting multi-tenancy adds more complexity to the shared application's required capabilities. Security is a key requirement that must be addressed when engineering new SaaS applications or when re-engineering existing applications to support multi-tenancy. Traditional security (re)engineering approaches do not fit with the multi-tenancy application model where tenants and their security requirements emerge after the system was first developed. Enabling, runtime, adaptable and tenant-oriented application security customization on single service instance is a key challenging security goal in multi-tenant application engineering. In this paper we introduce TOSSMA, a Tenant-Oriented SaaS Security Management Architecture. TOSSMA allows service providers to enable their tenants in defining, customizing and enforcing their security requirements without having to go back to application developers for maintenance or security customizations. TOSSMA supports security management for both new and existing systems. Service providers are not required to write security integration code to use a specific security platform or mechanism. In this paper, we describe details of our approach and architecture, our prototype implementation of TOSSMA, give a usage example of securing a multi-tenant SaaS, and discuss our evaluation experiments of TOSSMA.
To obtain a better understanding of WIL rationale and practices in Australian ICT degrees, a survey of managers and educational leaders of ICT was undertaken. These survey results were analysed and informed by discuss...
详细信息
Model transformations are the key part of Model Driven engineering (MDE). However, their specification is not user-friendly, due to excessive use of metamodels and textual representation of transformation languages. T...
详细信息
Model transformations are the key part of Model Driven engineering (MDE). However, their specification is not user-friendly, due to excessive use of metamodels and textual representation of transformation languages. This paper briefly describes the approach and tool under development for user-centric transformation generation using concrete model visualisations.
作者:
Iman AvazpourJohn GrundyFaculty of ICT
Centre for Computing and Engineering Software and Systems Swinburne University of Technology Hawthorn VIC Australia
Model Driven engineering (MDE) has become a commonly used approach in softwareengineering. It promotes using models as primary artefacts and proposes methods for transforming them to desired software products. Howeve...
详细信息
Model Driven engineering (MDE) has become a commonly used approach in softwareengineering. It promotes using models as primary artefacts and proposes methods for transforming them to desired software products. However, the specification of models and their transformations in MDE with current techniques is not user-friendly, due to excessive use of high level abstract models and textual representation of transformation languages. This paper briefly describes CONVErT, an approach and tool developed for user-centric transformation generation using concrete model visualisations.
Background: Systematic literature reviews are increasingly used in softwareengineering. Most systematic literature reviews require several hundred papers to be examined and assessed. This is not a trivial task and ca...
详细信息
ISBN:
(纸本)9781450315098
Background: Systematic literature reviews are increasingly used in softwareengineering. Most systematic literature reviews require several hundred papers to be examined and assessed. This is not a trivial task and can be time consuming and error-prone. Aim: We present SLuRp - our open source web enabled database that supports the management of systematic literature reviews. Method: We describe the functionality of SLuRp and explain how it supports all phases in a systematic literature review. Results: We show how we used SLuRp in our SLR. We discuss how SLuRp enabled us to generate complex results in which we had confidence. Conclusions: SLuRp supports all phases of an SLR and enables reliable results to be generated. If we are to have confidence in the outcomes of SLRs it is essential that such automated systems are used. Copyright 2012 ACM.
It is well recognized that visualizing traceability links between software artifacts helps developers to recover, browse, and maintain these inter-relationships effectively and efficiently. However, it is a major chal...
详细信息
It is well recognized that visualizing traceability links between software artifacts helps developers to recover, browse, and maintain these inter-relationships effectively and efficiently. However, it is a major challenge for researchers to efficiently visualize traceability links for big softwaresystems because of scalability and visual clutter issues. In this paper we present a new approach that combines treemap and hierarchical tree visualization techniques to provide a global structure of traces and a detailed overview of each trace. These both reduce visual clutter while still being highly scalable and interactive. Our usability study shows that our approach can support comprehension, browsing, and maintenance of traceability links.
Documentation written in natural language and source code are two of the major artifacts of a software system. Tracking a variety of traceability links between software documentation and source code assists software d...
详细信息
As modern softwaresystems operate in a highly dynamic context, they have to adapt their behaviour in response to changes in their operational environment or/and requirements. Triggering adaptation depends on detectin...
详细信息
Requirements need to be validated at an early stage of analysis to address inconsistency and incompleteness issues. Capturing requirements usually involves natural language analysis, which is often imprecise and error...
详细信息
暂无评论