Visual comprehension is the characteristic that deals with how efficiently and effectively users are able to grasp the underlying design intent along with the interactions to explore the visually represented informati...
详细信息
Model-driven architecture is a well-known approach for the development of complex softwaresystems. The most famous tool chain is provided by Eclipse with the tools of the Eclipse modeling project. Like Eclipse itself...
详细信息
This paper presents an integration of a model-based methodology for embedded real-time software with MARTE. However, although has being introduced as a new profile to overcome problem in previous profile, a sound and ...
详细信息
Since the early 2000s, Model-driven engineering has aimed to accomplish executable UML models. With fUML and PSCS, the Object Management Group (OMG) published standardized specifications of precise semantics for certa...
详细信息
Computational e-mail systems, which allow mail messages to contain command scripts that automatically execute upon receipt, can be used as a basis for building a variety of collaborative applications. However, their u...
详细信息
ISBN:
(纸本)9780897917322
Computational e-mail systems, which allow mail messages to contain command scripts that automatically execute upon receipt, can be used as a basis for building a variety of collaborative applications. However, their use also presents a serious security problem because a command script from a sender may access/modify receiver's private files or execute applications on receiver's behalf. Existing solutions to the problem either severely restrict I/O capability of scripts, limiting the range of applications that can be supported over computational e-mail, or permit all I/O to scripts, potentially compromising the security of the receiver's files. Our model, called the intersection model of security, permits I/O for e-mail from trusted senders but without compromising the security of private files. We describe two implementations of our security model: an interpreter-level implementation and an operating systems-level implementation. We discuss the tradeoffs between the two implementations and suggest directions for future work.
Multi-pushdown systems are a standard model for concurrent recursive programs, but they have an undecidable reachability problem. Therefore, there have been several proposals to underapproximate their sets of runs so ...
详细信息
Currently, the complexity of embedded software is increased, hence, more efficient design approaches are demanded. Although component based design is well-defined for developing Embedded Real Time (ERT) systems, the d...
详细信息
Cities are facing challenges of high rise in population number and con-sequently need to be equipped with latest smart services to provide luxuries of life to its *** integrated solutions are also a need to deal with ...
详细信息
Cities are facing challenges of high rise in population number and con-sequently need to be equipped with latest smart services to provide luxuries of life to its *** integrated solutions are also a need to deal with the social and environmental challenges,caused by increasing ***,the development of smart services’integrated network,within a city,is facing the bar-riers including;less efficient collection and sharing of data,along with inadequate collaboration of software and *** to resolve these issues,this paper recommended a solution for a synchronous functionality in the smart services’integration process through modeling *** this integration modeling solution,atfirst,the service participants,processes and tasks of smart services are identified and then standard illustrations are developed for the better understand-ing of the integrated service group *** process modeling and notation(BPMN)language based models are developed and discussed for a devised case study,to test and experiment i.e.,for remote healthcare from a smart *** research is concluded with the integration process model application for the required data sharing among different service *** outcomes of the modeling are better understanding and attaining maximum automation that can be referenced and replicated.
The successful implementation of Service-Oriented development of Distributed Embedded Real-time systems (DERTS) in the recent years has proved the importance of Service-Orientation over previous paradigms. However, ef...
详细信息
Information security surveys are important inputs to private, public and government sectors in order to measure current status of information security threats. This paper examines the various types of threats that exi...
详细信息
ISBN:
(纸本)9780982148914
Information security surveys are important inputs to private, public and government sectors in order to measure current status of information security threats. This paper examines the various types of threats that exist in Information systems (IS) in one of government supported hospital in Malaysia. The hospital has been equipped for a Total Hospital Information System (THIS). The data collected were from three different departments using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The result shows that the most critical threat for the THIS is the power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a comprehensive list of potential threat categories in IS and subsequently taking the results of this step as input for the risk mitigation strategy. Keywords: Healthcare Information systems (HIS), Information systems (IS), Risk Analysis, Threats
暂无评论