The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reinforcement learning techniques become more popular in computer network security. The same reinforcement learning techniques developed for network security can be applied to software security as well. This research summarizes a work in progress attempt to incorporate Q-learning algorithm in software security. The Q-learning method is embedded as part of the software itself to provide a security...
Requirements Engineering and Architectural Design are activities of the software development process that are strongly related and intertwined. Thus, providing effective methods of integration between requirements and architecture is an important Software Engineering challenge. In this context, the STREAM process presents a model-driven approach to generate early software architecture models from...
The Joint Task Force Global Network Operations (JTF-GNO) center is a subset of the Defense Information Systems Agency that is directly in charge of the security and architecture of the Department of Defense Global Information Grid. Since the inception of the JTF-GNO, the architecture has continually changed due to technical advances and increasing security concerns. Although many new systems have...
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the security of software-intensive system architectures that focusses on making these underlying assumptions explicit, so that they can be taken into account. Starting from an Alloy model of a software architecture, a set of constraints...
Even though nothing is ever that simple/clear cut in software engineering, one would argue that by contrast with source code, which represents the detailed functional attributes of a software product, the architecture of a software product represents its non functional attributes. The architecture of a software product determines such attributes as its response time, throughput, reliability, security,...
Software architecture (SA) is a crucial component of Model Driven Engineering (MDE), since it eases the communication and reuse of designs and components. However, existing languages (e.g., UML, AADL, SysML) are lacking many needed features. In particular, they provide rudimentary support for connectors, a first-class element in the components and connectors (C&C) architectural view and one of...
A multiagent system (MAS) architecture is structured in terms of autonomous and communicating components. Agent orientation does not support the modularization of some system properties that affect several system components. These properties are called ldquocrosscutting concernsrdquo and need to be explicitly captured in the architectural design of MAS. Aspect-orientation provides abstractions to...
Connector, an important concept in software architecture design, is considered as the first-class entity. In order to solve the code-tangling and code-scattering caused by crosscutting concerns, this paper puts forwards an aspectual connector model and its ADL. Then it discusses the implementation of aspectual connector based on AspectJ, which implicitly weaves aspectual connector and component. Furthermore,...
Architectural modelling and risk management are invaluable to increase the security of a software system. The purpose of this work is to show how both approaches can be integrated in a risk-aware architectural modelling technique. As the modelling is formal, the approach offers stronger guarantees that the resulting architecture achieves its security requirements.
This paper presents a formal specification of Mondex, an electronic purse, using SAM. Mondex is the first pilot project for the 6th Grand Challenge to develop an integrated, automated toolset that developers can use to establish the correctness of software. Several research groups around the world have applied different formal methods in specifying and analyzing the Mondex smart card since 2006. Our...
Software architecture design is an important stage in the whole software development lifecycle. There are so many various concerns at architecture level which relate to all kinds of stakeholders and describe the all facets of problem domain. Unfortunately, they often tangle and scatter in the components and connectors, result in the final architecture solutions uneasy to evolve and reuse. So in this...
Traditional architecture design approaches suffer from the crosscutting features and behaviors, which scattered and tangled in the components and connectors, result in the final architecture solutions uneasy to evolve and reuse. In this paper, we propose an approach for multi-dimensional separating crosscutting concerns at architecture level, including: (1) an architectural meta concern space can...
Many architecture description languages (ADLs) were proposed for describing structure of software systems in terms of components and connectors. However, specification of non-functional properties is not addressed well in these ADLs, although it is crucial for building quality software architectures. We propose new extensions of WRIGHT ADL with capabilities to specify non-functional properties at...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.