Context : In today’s fast-paced digital landscape, integrating DevOps, cloud, and agile methodologies is crucial for meeting software demands. However, this integration remains *** : This study explores the integrati...
详细信息
This article explores the value of science fiction narratives in games for citizen science. Focusing on the protein-folding game Foldit, it describes the process of modifying and redesigning the game to feature a fram...
详细信息
This article explores the value of science fiction narratives in games for citizen science. Focusing on the protein-folding game Foldit, it describes the process of modifying and redesigning the game to feature a framing narrative and other alterations to the main tutorial campaign. The campaign narrative, Foldit: First Contact, situates the practices of citizen science in an expanded context of meanings and ethical implications, promoting critical self-reflection on the relations of science and civic values. A study of player responses to Foldit: First Contact suggests the significance of science fiction and critical game design for attuning citizen scientists to the collective responsibilities of experimentation and innovation, drawing attention to the intersecting social, technical, and environmental domains in which gamers may contribute to scientific research.
The service cloud model allows hosted services to be dynamically provisioned and composed as part of larger, more complex cloud applications. Compatibility of interaction and quality of service are important to provis...
详细信息
The service cloud model allows hosted services to be dynamically provisioned and composed as part of larger, more complex cloud applications. Compatibility of interaction and quality of service are important to provis...
详细信息
The service cloud model allows hosted services to be dynamically provisioned and composed as part of larger, more complex cloud applications. Compatibility of interaction and quality of service are important to provisioning similar services available in the cloud to a client request. Auditing individual services, the composition and its outcome, and the overall cloud resources, used for monetary assessment or to ensure critical operations, also provide properties for reasoning over service and composition capabilities. Security policies and potential violations pose a threat to the composition since sensitive data may be leaked if information flow control guarantees cannot be proven. Service engineering lacks design principles and an expression infrastructure for formal representation and reasoning within a service cloud model. Reasoning over service compositions requires a formal language that can express multiple service and cloud properties. In this paper, we use coordination language techniques to express services, their interaction capabilities and information sharing constraints, and the infrastructure of a service cloud model in which services can be accurately provisioned, composed and reasoned over to provide necessary guarantees. We discuss lessons learned from the process of formulating the service representation and cloud model infrastructure.
In May 2006, a task was issued by the U.S. Deputy Under Secretary of Defense for Acquisition and Technology (DUSD (A&T)) to develop a Systems of Systems engineering Guidebook. The Office of the Secretary of Defens...
In May 2006, a task was issued by the U.S. Deputy Under Secretary of Defense for Acquisition and Technology (DUSD (A&T)) to develop a Systems of Systems engineering Guidebook. The Office of the Secretary of Defense (OSD) convened a small group of Government, Industry and Academia, and selected the Stevens Institute of Technology to lead the project. During the summer and autumn of 2006, the International Council on Systems engineering (INCOSE) was honored to be invited to provide a global representation of the systems engineering community in support of the OSD writing of a Systems of Systems, Systems engineering (SoS SE) Guide. On 22 December 2006 the draft SoS SE Guide, version 0.9, was released for review and use by the systems engineering community. Industry and academia have been asked to submit their comments as part of the effort to pilot the recommendations in the Guide. In 2007, OSD has been actively engaging a sample of DoD SoS programs to pilot the Guide, especially with respect to the 16 OSD SE processes. The responses will become part of the first update to the Guide. At this panel, OSD will present the background and motivation for writing the Guide, along with an update on the pilot. Both OSD and INCOSE will discuss their insights. As part of the broad SE community review, the Guide will also be viewed from the UK perspective of Capabilities Based Acquisition. Looking to the future, the concepts and practices of Net Centricity, Network Enablement of Capabilities, and Semantic Web will be considered and how they might be more deeply integrated into future versions of the Guide. This panel will provide opportunities for INCOSE to continue to work with OSD and collaborate on SoS SE.
Security certification assesses the security posture of a software system to verify its compliance with diverse, pre-specified security controls identified by guidelines from NIST and the US Department of Defense. Ser...
详细信息
ISBN:
(纸本)9781617386077
Security certification assesses the security posture of a software system to verify its compliance with diverse, pre-specified security controls identified by guidelines from NIST and the US Department of Defense. Service-oriented architectures (SOA) are difficult to certify because they require compliance verification over a mix of local, global, and interaction criteria dictated by the policies of the participating services and SOA governance. Web services further contribute to this difficulty because they lack direct methods to express security controls. Besides being understandable, the method of expression should indicate potential problems complying with chosen services. This paper presents a method for configuring of web service standards to enforce security requirements on service interaction specification documents within a SOA. The outcome serves as a mechanism to direct the population of constraints derived from security controls within standards specification documents, such as WS-Policy. We focus on security controls for auditing and how these can be enforced in an SOA. We introduce a reusable architecture to notate the comparison of security controls across services.
Dynamic, service-based systems offer powerful resources for knowledge and information processing in a crisis situation. These systems need efficient strategies to integrate diverse services under the stress of an emer...
详细信息
ISBN:
(纸本)9781617386077
Dynamic, service-based systems offer powerful resources for knowledge and information processing in a crisis situation. These systems need efficient strategies to integrate diverse services under the stress of an emergency to capture, organize, and disseminate appropriate information. These strategies require a combination of service discovery, 'mashing', and orchestration given workflow task templates that can be instantiated and deployed on demand. In this paper, we introduce the Δ-Federation reference architecture for on-demand emergency management systems (ODEMS). The Δ-Federation provides the foundation for incorporating these strategies that consider type, availability, and requirements of services as historically understood by users in similar crisis events.
Workflow reconfiguration traditionally modifies only workflow definitions. Incorporating dynamism in Web service workflows should also adapt instance execution as services change availability. Commercial workflow engi...
详细信息
Workflow reconfiguration traditionally modifies only workflow definitions. Incorporating dynamism in Web service workflows should also adapt instance execution as services change availability. Commercial workflow engines lack mechanisms to adapt instances except where instances deploy with all possible workflow paths, to achieve pseudo-dynamism. This error prone method has the potential for unsound specifications and still does not allow runtime modifications. We perform workflow reconfiguration through an inspection-feedback loop that decouples services specifications and priorities that can change BPEL workflows from their actual execution. When a change occurs, such as service unavailability, immediate adaptation of the workflow instance takes place. To guarantee proper reconfiguration, we formally specify the architecture, interactions, and change directives, according to a natural separation of reconfiguration concerns. We prove the workflow instance will correctly adapt to an alternative service when certain conditions are met.
Linking components with end-user requests for processing is problematic when there are fundamental language differences between component specifications and how individual users state their needs. Appropriate componen...
详细信息
Linking components with end-user requests for processing is problematic when there are fundamental language differences between component specifications and how individual users state their needs. Appropriate components may not exist, the users may not know if a component exists until a one matching their requirements is generated, or the users may adjust their requirements. For complex systems governed by a community of interest, we introduce a Fusion architecture coupled with Contract Templates (FACT). The Fusion architecture assists with syntactic and semantic unification of user directives. Contract Templates provide a standardized mechanism to collect heterogeneous systems within domains of interest. Based upon specific analysis of each component, Contract Templates attach connectors to generate integrated systems to which queries can be directed. A case study demonstrates how FACT enables military analysts to direct the use of simulation software for the experimentation of command and control behaviors within missions.
The seamless integration of commercial-off-the-shelf (COTS) components offers many benefits associated with reuse. Even with successful composite applications, unexpected interoperability conflicts can arise when COTS...
详细信息
暂无评论