346,202 research outputs found

    Aligning a Service Provisioning Model of a Service-Oriented System with the ITIL v.3 Life Cycle

    Get PDF
    Bringing together the ICT and the business layer of a service-oriented system (SoS) remains a great challenge. Few papers tackle the management of SoS from the business and organizational point of view. One solution is to use the well-known ITIL v.3 framework. The latter enables to transform the organization into a service-oriented organizational which focuses on the value provided to the service customers. In this paper, we align the steps of the service provisioning model with the ITIL v.3 processes. The alignment proposed should help organizations and IT teams to integrate their ICT layer, represented by the SoS, and their business layer, represented by ITIL v.3. One main advantage of this combined use of ITIL and a SoS is the full service orientation of the company.Comment: This document is the technical work of a conference paper submitted to the International Conference on Exploring Service Science 1.5 (IESS 2015

    Web development evolution: the assimilation of web engineering security

    Get PDF
    In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues. Analyzing the underlying causes of these security breaches shows that a significant proportion of them are caused by straightforward design errors in systems and not by failures in security mechanisms. There is significant research into security mechanisms but there is little research into the integration of these into software design processes, even those processes specifically designed for Web Engineering. Security should be designed into the application development process upfront through an independent flexible methodology that contains customizable components

    Web development evolution: the assimilation of web engineering security

    Get PDF
    In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues. Analyzing the underlying causes of these security breaches shows that a significant proportion of them are caused by straightforward design errors in systems and not by failures in security mechanisms. There is significant research into security mechanisms but there is little research into the integration of these into software design processes, even those processes specifically designed for Web Engineering. Security should be designed into the application development process upfront through an independent flexible methodology that contains customizable components

    Early evaluation of security functionality in software projects - some experience on using the common criteria in a quality management process

    Get PDF
    This paper documents the experiences of assurance evaluation during the early stage of a large software development project. This project researches, contracts and integrates privacy-respecting software to business environments. While assurance evaluation with ISO 15408 Common Criteria (CC) within the certification schemes is done after a system has been completed, our approach executes evaluation during the early phases of the software life cycle. The promise is to increase quality and to reduce testing and fault removal costs for later phases of the development process. First results from the still-ongoing project suggests that the Common Criteria can define a framework for assurance evaluation in ongoing development projects.Dieses Papier dokumentiert den Versuch, mittels der Common Criteria nach ISO 15408 bereits während der Erstellung eines Softwaresystems dessen Sicherheitseigenschaften zu überprüfen. Dies geschieht im Gegensatz zur üblichen Post-Entwicklungs-Evaluation

    FoodSTART+ Grant completion report.

    Get PDF

    Autonomic management of multiple non-functional concerns in behavioural skeletons

    Full text link
    We introduce and address the problem of concurrent autonomic management of different non-functional concerns in parallel applications build as a hierarchical composition of behavioural skeletons. We first define the problems arising when multiple concerns are dealt with by independent managers, then we propose a methodology supporting coordinated management, and finally we discuss how autonomic management of multiple concerns may be implemented in a typical use case. The paper concludes with an outline of the challenges involved in realizing the proposed methodology on distributed target architectures such as clusters and grids. Being based on the behavioural skeleton concept proposed in the CoreGRID GCM, it is anticipated that the methodology will be readily integrated into the current reference implementation of GCM based on Java ProActive and running on top of major grid middleware systems.Comment: 20 pages + cover pag

    An agent based approach for improvised explosive device detection, public alertness and safety

    Get PDF
    One of the security challenges faced by our contemporary world is terror threats and attacks, and this is no doubt posing potential threats to lives, properties and businesses all around us; affecting the way we live and also travel. Terror attacks have been perpetrated in diverse ways whether from organized terror networks through coordinated attacks or by some lone individuals such that it is now a major concern to people and government. Indeed, there are numerous forms of terror attacks. In this proposal, we look at how the explosive substance kind of threats can be perceived and taken care of prior to potential attacks using intelligent agent systems requirement analysis. Thus, the paper demonstrates using an agent-oriented system analysis and design methodology to decompose. Through defined percepts, goals and plans, agents possess capabilities to observe and perform actions. This proposal demonstrates: how agents can be situated in our cities, goal refinement for agents in the detection and rescue of potential terror attacks, and inter-agent communication for the prevention of chemical terror attack

    Friends without Benefits: How States Systematically Shortchange Teachers' Retirement and Threaten Their Retirement Security

    Get PDF
    Americans are often reminded that it's never too soon to start saving for retirement. Many of the nation's public school teachers are doing just that -- buying into their state pension system with plans to retire comfortably. However, this new study estimates that nearly 50 percent of all public school teachers will not qualify for even a minimal pension benefit, and less than 20 percent will stay in the profession long enough to earn a normal retirement benefit.This Joyce-funded report demonstrates the consequences of poorly structured state and city policies that can exacerbate retirement insecurity for our nation's teachers. For example, an individual teacher could forfeit up to 6.5 percent of her annual salary for one year, or, due to compound interest, 22.6 percent of her annual salary after three years according to Bellwether's analysis. To put these penalties in dollar terms, a hypothetical teacher earning 40,000ayearcouldfaceasavingspenaltyof40,000 a year could face a savings penalty of 2,601 for teaching only one year and $9,035 if she left after three years. This money stays with the pension funds and is used to supplement the pensions of the remaining teachers.Tackling the pension system is critical for reducing teacher turnover and retaining the profession's most talented educators. Several policy solutions are offered
    • …
    corecore