The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we discuss the way to identify various design patterns, their types and about the methods involved in the re-designing process. We also propose to evaluate the identified patterns considering various quality attributes (e.g, maintainability, security, availability, reliability) beside the quantitative character. Our proposal is to identify the design patterns with respect to the internet...
As the importance of non-functional requirements has increased, many researchers have become interested in software development process for non-functional requirements including the notation, modeling, and assessment of non-functional requirements. However, the characteristics of non-functional requirements are so sophisticated that there have been many topics that should be defined more clearly....
Watchdog timers are often used to trigger recovery of failed processes. But to this end the watchdog itself must be fail-safe. This work maximizes watchdog timer availability by a smart technology combination: replicated watchdogs, only one active at a time; hidden watchdogs, inside carrier processes. This approach was validated by implementation and testing within a security system.
Enterprise Service-Oriented Architecture (ESOA) style defines the principles and guidelines for designing and implementing complex business processes and systems. This paper classifies ESOA style to six substyles based on a domain model of service-oriented enterprise and an abstract model we proposed. The definition of each style is provided. A comparison of parts and constraints of five basic ESOA...
This paper is concerned with correct specification and validation of quality attribute requirements (QAR's) that cross-cut through a diverse set of complex system functions. These requirements act as modifiers of the systems level functional requirements thereby having substantial influence on the eventual architectural selection. Because system designers traditionally address these requirements one...
Even though nothing is ever that simple/clear cut in software engineering, one would argue that by contrast with source code, which represents the detailed functional attributes of a software product, the architecture of a software product represents its non functional attributes. The architecture of a software product determines such attributes as its response time, throughput, reliability, security,...
Although many aids such as architectural styles and patterns are now available for software architects, making optimal design decisions on appropriate architectural structures still requires significant creativity. In an effort to introduce a more direct link between an architectural decision and its consequences, a finer grained architectural concept called a tactic has emerged. Since its introduction,...
Most distributed systems that we use in our daily lives have layered architecture since such architectures allow separation of processing between multiple processes in different layers thereby reducing the complexity of the system. Unauthorized control over such systems can have potentially serious consequences ranging from huge monetary loss to even loss of human life. Hence considerable research...
Significant technological advancement in the current electronic era has influenced the work processes of private and government business entities. E-Government is one such area where almost every country is emphasizing and automating their work processes. Software architecture is the integral constituent of any software system with not only cumbersome modeling and development but require heedful evaluation...
In the real world a service in a business is usually composed of many component services. These component services join together to form a composite of components. The trustworthiness of component services determines the trustworthiness of this composite. This trustworthiness of composite service has a large impact on the successful delivery of a service. In this paper we study that how we can determine...
Self-managing systems are the focus of an increasing research activity since can provide a more robust way of building software artifacts. In this paper, we focus on self-managing systems for adapting the security concern. Providing security as a one-size-fits-all solution results in a system that is far too rigid to accommodate the needs of different application domains. Security mechanisms can depend...
Service-oriented Architectures deliver a flexible infrastructure to allow independently developed software components to communicate in a seamless manner. In the scope of organisational workflows, SOA provides a suitable foundation to execute business processes as an orchestration of multiple independent services. Along with the increased connectivity, the corresponding security risks rise exponentially...
The goal of service oriented architectures (SOAs) is to enable the creation of business applications through the automatic discovery and composition of independently developed and deployed (Web) services. Automatic discovery of Web services (WSs) can be achieved by incorporating semantics into a richer WS description model (WSDM) and by the use of semantic Web (SW) technologies in the WS matchmaking...
We propose a general survivability quantification framework which is applicable to a wide range of information system architectures and applications. We show how this framework can be used to derive survivability measures based on different definitions and extend it to other measures not covered by current definitions which can provide helpful information for better understanding of system steady...
As the importance of service's continuity for service-oriented computing (SOC) system and present QoS assurance mechanisms in SOC system did not take full account of the impact of the service components dynamics. In order to solve this problem credit model and credit function was put forward, CRD (credit record data) is used to quantize the SOC system's dynamic. A new QoS assurance mechanism which...
Software architecture design is an important stage in the whole software development lifecycle. Yet non-functional requirements (NFRs) have been afflicted architects for a long time and how to efficiently design and address them also becomes a big headache problem. This paper focuses on the NFRs in architecture and offers a preliminary insight on separating them in a multiple dimensional way. Consequently,...
Many companies and governmental organizations are looking towards Web services, play an important key role in implementing service oriented architecture (SOA) as a platform that support a wide range of demanding applications. But current Web services standards have many critical limitations: performance degradation due to network latency and limited network bandwidth, vulnerability from security attacks,...
MDX is a language that expresses selections, calculations, and some metadata definitions against an Online Analytical Processing (OLAP) database. As the user interface with OLAP, the MDX complier is a major component of the OLAP analysis server. This paper addresses the system design of MDX compiler via the ADD method, meaning that system requirements, including functional and quality requirements...
Accountability is a composite measure for different but related quality aspects. To be able to ensure accountability in practice, it is required to define specific quality attributes of accountability, and metrics for each quality attribute. In this paper, we propose a quality detection and diagnosis framework for the service accountability. We first identify types of quality attributes which are...
Traditional architecture design approaches suffer from the crosscutting features and behaviors, which scattered and tangled in the components and connectors, result in the final architecture solutions uneasy to evolve and reuse. In this paper, we propose an approach for multi-dimensional separating crosscutting concerns at architecture level, including: (1) an architectural meta concern space can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.