The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
DevOps practices deal with such things as the velocity of releases, how fast incidents are handled, and the enforcement of organizationally specified security practices. All these are critical for success in today’s environment, and the architect is critical for success in adopting DevOps practices. This instalment of the Pragmatic Architect explains why.
Cyber security concerns in the automotive industry have been constantly increasing as automobiles are more computerized and networked. Recent successful hacks of modern vehicles demonstrate the big security concerns for automotive systems. However it is still very hard and even impossible to predict what kinds of security issues will happen. In this paper, we present the automotive security concerns...
Although critical for delivering resilient, secure, efficient, and easily changed IT systems, cross-technology, cross layer quality defect detection in IT systems still faces hurdles. Two hurdles involve the absence of an absolute target architecture and the difficulty of apprehending multi-component anti-patterns. However, Static analysis and measurement technologies are now able to both consume...
In a software product line, security may need to be varied. Consequently, security variability must be managed both from the customer and product line architecture point of view. We utilize design science to build an artifact and a generalized design theory for representing and configuring security and functional variability from the requirements to the architecture in a configurable software product...
Non-functional requirements (NFRs) such as security, reliability and performance play a crucial role in the development of modern distributed systems. The burden of incorporating NFRs into a system's architecture, as well the determination of new design-level NFRs, can be greatly eased by the use of a structured approach providing guidance to developers. Such structured approaches, however, require...
Reviewing software system architecture to pinpoint potential security flaws before proceeding with system development is a critical milestone in secure software development lifecycles. This includes identifying possible attacks or threat scenarios that target the system and may result in breaching of system security. Additionally we may also assess the strength of the system and its security architecture...
In this paper, we propose a system of the security robot and its software architecture. The software architecture consists of two parts, which are an autonomous navigation part and a semantic perceptron part. Autonomous navigation software can drive a robot autonomously. An semantic perception software can perform the security missions. The security patrol scenario compromises three steps. In the...
Architecture design of a software product line includes a lot of decision of how the variability component will be implemented. The decision corresponds to the requirements of the architecture specifications. Furthermore, most of the decision may have dependency between components. However, only some research devoted to address the quality attributes. In this paper, we propose a new approach that...
Useful enhancements to UML for security exist, including for the requirements and analysis/design stages: notably misuse case diagrams/descriptions, mis-sequence diagrams, UMLpac, and security patterns. These all consider security attacks on software functionality. This paper considers the system architecture when analyzing security. The advantage of the proposed misuse deployment diagram is that...
The main task of the software product line architecture design is to develop the reference architecture which represent the base structure of the member products. Qualitydriven Architecture Design and quality Analysis (QADA) is the architecture design method, which has attracted many attentions since it emphasizes on addressing quality issues of the member products at early stage of the system development...
Today computer systems are becoming very complex and often depending on some off-the-shelf components or external service providers. Validating the security aspects of these systems is a highly challenging goal, especially when we target security critical systems where guarantees must be provided on the robustness of the produced systems. Model Driven Engineering (MDE) is becoming popular and well...
Raising the level of abstraction is an important research topic in the context of software for mobile and embedded devices. Model Driven Software Development techniques have been recognized for their ability to provide this abstraction by separating domain specific aspects from their technical implementation. Traditionally, such approaches rely on static code generation, which does not fit well in...
This paper examines service migration in a new computing paradigm, the cloud computing environment (CCE), by examining security and integration issues associated with service implementation. We postulate that a cloud architecture will evolve to be both more flexible and heterogeneous in resources because of the services complexity demanded by organizations. This introduces additional, but tractable,...
SaaS (Software as a Service) is a kind of application services which is provided via Internet, and customers can order and receive their peculiar types of software application services from the SaaS provider via the Internet according to their actual needs. This paper analysis current development of SaaS, by means of comparing SaaS model with traditional software model, a new engineering method is...
As the importance of non-functional requirements has increased, many researchers have become interested in software development process for non-functional requirements including the notation, modeling, and assessment of non-functional requirements. However, the characteristics of non-functional requirements are so sophisticated that there have been many topics that should be defined more clearly....
C/S and B/S structure is analyzed that the two structures have their different advantages and disadvantages. The hybrid software architecture combined the advantages of C/S and B/S. The China Petrochemical Corporation Luoyang branch crude oil transport management system is developed by the C/S and B/S Hybrid software Architecture and runs well. These practices make it clear that the Hybrid software...
Service composition is an effective way to achieve value-added service, which has found wide application in various areas. security design at architecture level is critical to achieve high assurance for these applications. However, most security design techniques for service composition were in ad hoc fashion and fell short in precise notations. This paper proposes a formal aspect-oriented approach...
The 21st century will be the century of knowledge, and then knowledge management plays an increasingly important role in economic life. Knowledge Management-Oriented OA (Office Automation), whose connotation and extension have entirely changed, breaks through traditional limitations caused by Official Document-Oriented OA. Keeping an eye on the latest IT application technology, we will research the...
The Joint Task Force Global Network Operations (JTF-GNO) center is a subset of the Defense Information Systems Agency that is directly in charge of the security and architecture of the Department of Defense Global Information Grid. Since the inception of the JTF-GNO, the architecture has continually changed due to technical advances and increasing security concerns. Although many new systems have...
With the service-oriented paradigm, some established ways of thinking about software quality and its assurance seem to change. But things do not necessarily become more difficult. Some considerable advancements to traditional ways of quality management can be introduced through the use of service-based systems, leading to largely reduced efforts and increased quality. In this article we identify the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.