When transacting and interacting through open computer networks, traditional methods used in the physical world for establishing trust can no longer be used. Creating virtual network substitutes with which people, org...
详细信息
It is well known that errors introduced early in the development process are commonly the most expensive to correct. The increasingly popular model-driven architecture (MDA) exacerbates this problem by propagating the...
详细信息
Increasingly, software should dynamically adapt its behavior at run-time in response to changing conditions in the supporting computing and communication infrastructure, and in the surrounding physical environment. In...
详细信息
ISBN:
(纸本)1595933751
Increasingly, software should dynamically adapt its behavior at run-time in response to changing conditions in the supporting computing and communication infrastructure, and in the surrounding physical environment. In order for an adaptive program to be trusted, it is important to have mechanisms to ensure that the program functions correctly during and after adaptations. Adaptive programs are generally more difficult to specify, verify, and validate due to their high complexity. Particularly, when involving multi-threaded adaptations, the program behavior is the result of the collaborative behavior of multiple threads and software components. This paper introduces an approach to create formal models for the behavior of adaptive programs. Our approach separates the adaptation behavior and nonadaptive behavior specifications of adaptive programs, making the models easier to specify and more amenable to automated analysis and visual inspection. We introduce a process to construct adaptation models, automatically generate adaptive programs from the models, and verify and validate the models. We illustrate our approach through the development of an adaptive GSM-oriented audio streaming protocol for a mobile computing application. Copyright 2006 ACM.
Achieving acceptable quality of service in highly dynamic computing environments requires not only adaptation and reconfiguration of individual components of the system, but also collaboration among these components. ...
详细信息
The advent of service-oriented Grid computing has resulted in the need for Grid resources such as clusters to enforce user-specific service needs and expectations. Service Level Agreements (SLAs) define conditions whi...
详细信息
In the service-oriented software environment, interactions between components are highly dependent on the exposed service interfaces. Therefore, designing an appropriate service interface is essential. In this paper, ...
详细信息
With the emergence of aspect-oriented (AO) techniques, crosscutting concerns can be now explicitly modularized and exposed as additional variabilities in program families Hence, the development of highly customizable ...
详细信息
ISBN:
(纸本)9781627486606
With the emergence of aspect-oriented (AO) techniques, crosscutting concerns can be now explicitly modularized and exposed as additional variabilities in program families Hence, the development of highly customizable software family architectures requires the explicit handling of crosscutting variabilities through domain engineering and application engineering steps In this context, this paper presents a generative model that addresses the implementation and instantiation of variabilities encountered in AO software family architectures The use of our model allows for an early specification and preparation of AO variabilities, which in turn can be explicitly customized by means of domain engineering activities All the variabilities of the architecture are modeled using feature models In application engineering, developers can request an instance of the AO architecture in a process of two stages: (i) the definition of a feature model instance which specifies the resolution of variabilities for the AO family architecture;and (ii) the definition of a set of crosscutting relationships between features.
Modeling and simulation of physical security systems involves designing and analyzing security systems, protocols, and policies that aim to protect fixed-site facilities against intrusions by external threats, as well...
详细信息
ISBN:
(纸本)1595933158
Modeling and simulation of physical security systems involves designing and analyzing security systems, protocols, and policies that aim to protect fixed-site facilities against intrusions by external threats, as well as unauthorized acts by insiders. Realistic and credible simulations of such systems require incorporation of human behavior models along with cooperative engagement policies such as team formation, allocation of roles, team reorganization, and distributed decision making. In this paper, we discuss agent-based conceptual design of a physical systems security simulation within the context of a shoplifting study. The primary contributions include (1) the use of a conceptual facility configuration meta-model that is used for flexible instantiation of environmental settings in which agents (i.e.. customers, including shoplifters, workers, and security personnel) are situated, (2) a novel line-of-sight mechanism for realizing the visual perception subsystem of agents, and (3) the simulation of reactive as well as deliberate decision making processes of agents.
Web Service technologies offer a successful way for interoperability among applications. However, although current approaches are beginning to address how to specify non-functional capabilities in Web Services at desc...
详细信息
We present a Secure E-commerce Protection Profile (SEPP) that captures security requirements for securing sessions in the e-commerce operational environment. The SEPP is prepared in accordance with the Common Criteria...
详细信息
ISBN:
(纸本)1601320019
We present a Secure E-commerce Protection Profile (SEPP) that captures security requirements for securing sessions in the e-commerce operational environment. The SEPP is prepared in accordance with the Common Criteria (CC), Version 2.1, as specified by the ISO 15408 standard. The SEPP states the requirements that sessions must satisfy in order to respond to the needs of e-commerce. The Target of Evaluation (TOE) security environment, which is composed of threat agents, vulnerabilities, attacks and threats, is described in detail. It is followed by describing the administrative security policies that are necessary to safeguard the TOE or its operating environment. The risks to the TOE are identified. The security objectives for the TOE are stated.
暂无评论