The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The context of software architecting increasingly reflects webs of IT companies pooling resources together for software development. What results is a networked organization, populated by heterogeneous development communities connected via internet. How does this scenario change the process of software architecting? Pivoting around this research question, this paper presents architecture concerns...
When architecting software systems, architects (with the contribution of other stakeholders) make several design decisions. These decisions could be related to the selection of the right components and connectors, the architectural style to be used, the distribution of various components, the deployment of software components into hardware devices, etc. Many methods have been proposed by the research...
Software systems are increasingly constructed on top of a software platform by adding and composing components that more often than not are developed by external actors. Those platforms project into software systems their own architecture and concepts and impose constraints, this strongly influences how components are developed and/or integrated. It is generally recognized that software architectures...
Architecture evaluation has become a mature sub-discipline in architecting with high-quality practical and scientific literature available. However, publications on industrial applications and concrete experiences are rare. We want to fill this gap and share our experiences - having performed more than 50 architecture evaluations for industrial customers in the last decade. We compiled facts and consolidated...
Nowadays, the Web offers huge amounts of data sources for the benefit of the community. However, there is a lack of practical approach for converting and linking multi-origin data sources into one coherent smart data set. In this paper, we define a service-oriented architecture to attach explicit semantics to data, to solve heterogeneity issues, and to remove data inconsistencies in order to convert...
The success of software ecosystems highly depends on the variety and quality of end-user applications. Therefore, attracting third-party developers and facilitating application development is crucial. Platform boundary resources enable third-party developers to create the applications. Thus, the platform boundary resources expose and extend the platform architecture. We conducted an industrial case...
In recent times technical developments in electric mobility have been rapid. With raising economic and ecological concerns about conventional vehicles, individuals and companies need to consider switching to electric vehicles. But due to limited range and charge times such vehicles are currently not sufficient. New mobility concepts are needed as well. In this work we present the Shared E-Fleet architecture...
As there is no perfect software requirement specification practically, software testing needs test requirement analysis called TRA. TRA is one of the most important activities. In TRA, test requirement model is constructed and mainly consists of test conditions. In this research we assume that TRA engineers may implicitly omit necessary test conditions if they construct test requirement models not...
Big Data is a huge phenomenon of last days. Number of applications using this concept is still increasing and area of implementation is still wider and wider. There are different examples such as transport, health-care, industry or education. This work covers just the field of education or university's environment. Purpose of this work is to identify Big Data sources from university's environment...
Business rules can be crucial to an organization's business operations. In view of a growing number of internal and external challenges (such as compliance with regulations, the need for organizational agility, or the need to retain organizational knowledge), organizations increasingly are forced to actively manage their business rules in order to stay successful. However, business rules management...
This research proposes a framework that helps information systems managers to interpret present state of the system, to understand its past and to predict its future. The benefits of the framework are twofold. First, it gives managers a tool for assessing the impact of a change from either the users or the business/IS perspective. Managers can use this framework to design a strategy for information...
Software is a generic term for organized collections of computer data and instructions; it is amalgamation of machine understandable instructions that preside over the processor of computer to perform itemized operations. The importance of software accompanies the effect of its malleability towards software development life cycle. Antecedent models such as Prototyping model, Incremental model, waterfall...
Modern cloud-based applications and infrastructures may include resources and services (components) from multiple cloud providers, are heterogeneous by nature and require adjustment, composition and integration. The specific application requirements can be met with difficulty by the current static predefined cloud integration architectures and models. In this paper, we propose the Intercloud Operations...
The value of information as a competitive differential has been taken into consideration in companies all over the world for some time already. In recent years, there has been heated debate about some terms originated from new concepts related to information, such as big data, due to the promise that such topic might revolutionise world trade. Hence, data and information governance and quality have...
Smart Grids provide an effective and efficient management of production, transmission, distribution and usage of electricity. One of the main issues in designing applications for Smart Grids is the need to cope with a plethora of different devices, communication protocols and data representations. This paper presents the design of a Home Energy Gateway (HEG) that abstracts heterogeneous devices and...
When managing IT environments and designing business processes, compliance regulations add challenges. Especially considering adaptive environments in the context of a service-oriented architecture in combination with exploiting the advantages of cloud technologies, maintaining compliance is cumbersome. Measures have to be taken on many application levels - including business processes, IT architecture,...
In this paper, we present an enhanced public key infrastructure (PKI) which supports identity-based cryptography (IBC). In precise, we show how to integrate IBC into PKI as well as solving the problems of user secret key revocation and the cross validation of PKI and IBC. As a proof of concept, an IBC framework is incorporated into EJBCA and the performance is reported.
This paper describes the problem context of software development for mass-produced embedded systems, with distinguishing factors such as the co-design of software and hardware, strong focus on manufacturing aspects, supplier involvement and safety-critical functionality. In this context there is a need for a holistic model to explain the failures and successes industrial projects, where just investigating...
The principles of Agile software development are increasingly used in large software development projects, e.g. using Scrum of Scrums or combining Agile and Lean development methods. When large software products are developed by self-organized, usually feature-oriented teams, there is a risk that architectural dependencies between software components become uncontrolled. In particular there is a risk...
At every step in creating an enterprise design, architects encounter risks and opportunities. In most cases, risk assessment and treatment is done using the company's internal methodology or based on some best-practices known by the architect. We propose a method that can combine both qualitative and quantitative risk analysis and also incorporate risk mitigation solutions. In IT security, attack-defence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.