35,567 research outputs found

    An Extension of Business Process Model and Notation for Security Risk Management

    Get PDF
    Kaasaegsed infosĂŒsteemide arendamise metoodikad hĂ”lmavad erinevaid tehnilisi Ă€riprotsesside modelleerimise meetmeid. Äriprotsesside modelleerimiseks kasutatav keel (BPMN) on tĂ€napĂ€eval muutunud ĂŒheks standartseks meetmeks, mis edukalt rakendatakse infosĂŒsteemide loomisel ning edasi arendamisel selleks, et ettevĂ”tete Ă€riprotsesse kirjeldada ja modelleerida.Vaatamata sellele, et BPMN on hea töörist, mille abil on vĂ”imalik ettevĂ”tte Ă€riprotsesse mĂ”istma ja esitama, see ei vĂ”imalda Ă€riprotsesside modelleerimisel adresseerida sĂŒsteemi turvalisuse aspekte. Autor leiab, et see on BPMN nĂ”rk kĂŒlg, selle pĂ€rast, et turvalise infosĂŒsteemi arendamiseks on oluline nii Ă€riprotsesse kui ka sĂŒsteemi turvalisust vaadeldada tervikuna. KĂ€esolevas magistritöös autor töötab vĂ€lja BPMN 2.0 keele jaoks uusi elemente, mis edaspidi peavad vĂ”imaldama adresseerima turvalisuse temaatika sĂŒsteemi modelleerimisel. Autori pakutud lahendus pĂ”hineb BPMN modelleerimiskeele seostamisel turvalisuse riski juhendamise metoodikaga (ISSRM). Antud magistritöös rakendatakse struktureeritud lĂ€henemine BPMN peamiste aspektide analĂŒĂŒsimisel ja turvalisuse riskide juhtimiseks uute elementide vĂ€ljatöötamisel, selleks ĂŒhildades BPMN ning ISSRM-i kontsepte. Magistritöös on demonstreeritud vĂ€ljatöötatud lisaelementide kasutus, selgitatud kuidas antud elementidega laiendatud BPMN vĂ”imaldab vĂ€ljendada ettevĂ”tte varasid (assets), nendega seotuid riske (risks) ja riskide kĂ€sitlust (risk treatment). See on analĂŒĂŒsitud internetkaupluse varade konfidentsiaalsuse, terviklikkuse ja kĂ€ttesaadavuse nĂ€itel. Autor on veendunud, et BPMN laienemine turvalisuse kontseptide osas ja antud töö raames tehtud konkreetsed ettepanekud aitavad infosĂŒsteemide analĂŒĂŒtikutele mĂ”istma kuidas sĂŒsteemi turvalisust arendada nii, et lĂ€bi Ă€riprotsessi tuvastatud olulisemate ettevĂ”tte varade turvalisus oleks infosĂŒsteemis kĂ€sitletud ning tagatud. Autori poolt antud kĂ€sitlus on vaadeldud ka laiemas mĂ”ttes, nimelt, BPMN keelele pakutud laienemisega avaneb perspektiiv Ă€riprotsesside ja turvalisuse mudeleite koosvĂ”imele ning BPMN-i teiste modelleerimise metoodikatega, nagu ISSRM vĂ”i Secure Tropos, integreerimisele.Modern Information System (IS) development supports different techniques for business process modelling. Recently Business Process Model and Notation (BPMN) has become a standard that allows modelers to visualize organizational business processes. However, despite the fact that BPMN is a good approach to introduce and understand business processes, there is no opportunity to address security concerns while analysing the business needs. This is a problem, since both business processes and security concerns should be understood in parallel to support a development of the secure systems. In current thesis we introduce the extensions for BPMN 2.0 regarding security aspects. The following proposal is based on alignment of the modelling notation with IS security risk management (ISSRM).We apply a structured approach to understand major aspects of BPMN and propose extensions for security risk management based on the BPMN alignment to the ISSRM concepts. We demonstrate the use of extensions, illustrating how the extended BPMN could express assets, risks and risk treatment on few running examples related to the Internet store assets’ confidentiality, integrity and availability. We believe that our proposal would allow system analysts to understand how to develop security requirements to secure important assets defined through business processes. We also attempt to observe the following approach in the broader sense and we open a possibility for the business and security model interoperability and the model transformation between BPMN and another modelling approach also aligned to ISSRM, Secure Tropos

    Scope Management of Non-Functional Requirements

    Get PDF
    In order to meet commitments in software projects, a realistic assessment must be made of project scope. Such an assessment relies on the availability of knowledge on the user-defined project requirements and their effort estimates and priorities, as well as their risk. This knowledge enables analysts, managers and software engineers to identify the most significant requirements from the list of requirements initially defined by the user. In practice, this scope assessment is applied to the Functional Requirements (FRs) provided by users who are unaware of, or ignore, the Non-Functional Requirements (NFRs). This paper presents ongoing research which aims at managing NFRs during the software development process. Establishing the relative priority of each NFR, and obtaining a rough estimate of the effort and risk associated with it, is integral to the software development process and to resource management. Our work extends the taxonomy of the NFR framework by integrating the concept of the "hardgoal". A functional size measure of NFRs is applied to facilitate the effort estimation process. The functional size measurement method we have chosen is COSMICFFP, which is theoretically sound and the de facto standard in the software industry

    Towards a scope management of non-functional requirements in requirements engineering

    Get PDF
    Getting business stakeholders’ goals formulated clearly and project scope defined realistically increases the chance of success for any application development process. As a consequence, stakeholders at early project stages acquire as much as possible knowledge about the requirements, their risk estimates and their prioritization. Current industrial practice suggests that in most software projects this scope assessment is performed on the user’s functional requirements (FRs), while the non-functional requirements (NFRs) remain, by and large, ignored. However, the increasing software complexity and competition in the software industry has highlighted the need to consider NFRs as an integral part of software modeling and development. This paper contributes towards harmonizing the need to build the functional behavior of a system with the need to model the associated NFRs while maintaining a scope management for NFRs. The paper presents a systematic and precisely defined model towards an early integration of NFRs within the requirements engineering (RE). Early experiences with the model indicate its ability to facilitate the process of acquiring the knowledge on the priority and risk of NFRs

    Identifying and addressing adaptability and information system requirements for tactical management

    Get PDF

    Formalising responsibility modelling for automatic analysis

    Get PDF
    Modelling the structure of social-technical systems as a basis for informing software system design is a difficult compromise. Formal methods struggle to capture the scale and complexity of the heterogeneous organisations that use technical systems. Conversely, informal approaches lack the rigour needed to inform the software design and construction process or enable automated analysis. We revisit the concept of responsibility modelling, which models social technical systems as a collection of actors who discharge their responsibilities, whilst using and producing resources in the process. Responsibility modelling is formalised as a structured approach for socio-technical system requirements specification and modelling, with well-defined semantics and support for automated structure and validity analysis. The effectiveness of the approach is demonstrated by two case studies of software engineering methodologies

    Design-time Models for Resiliency

    Get PDF
    Resiliency in process-aware information systems is based on the availability of recovery flows and alternative data for coping with missing data. In this paper, we discuss an approach to process and information modeling to support the specification of recovery flows and alternative data. In particular, we focus on processes using sensor data from different sources. The proposed model can be adopted to specify resiliency levels of information systems, based on event-based and temporal constraints

    Distribution pattern-driven development of service architectures

    Get PDF
    Distributed systems are being constructed by composing a number of discrete components. This practice is particularly prevalent within the Web service domain in the form of service process orchestration and choreography. Often, enterprise systems are built from many existing discrete applications such as legacy applications exposed using Web service interfaces. There are a number of architectural configurations or distribution patterns, which express how a composed system is to be deployed in a distributed environment. However, the amount of code required to realise these distribution patterns is considerable. In this paper, we propose a distribution pattern-driven approach to service composition and architecting. We develop, based on a catalog of patterns, a UML-compliant framework, which takes existing Web service interfaces as its input and generates executable Web service compositions based on a distribution pattern chosen by the software architect

    Decentralizing the Stochastic Growth Model

    Get PDF
    The objective of this paper is to propose a number of alternative decentralized interpretations of representative agent style stochastic growth economies and to explore their implications for the generality of this model construct. Under our first interpretation, firms exist forever and undertake all multiperiod investment decisions while consumer-worker-investors only own financial claims to the firm's output. This contrasts with the more standard decentralization approach where firms exist on a period-by-period basis and consumer-workerinvestors have direct title to the economy's capital stock. Under our second interpretation shareholders hire a manager who undertakes the firm's investment decisions in conformity with his incentive contract. The time series properties of the shareholder-manager economy are seen to replicate those of the analogous representative agent economy if and only if the manager's contract assumes a specific form. This suggests the time series properties of an economy where incentive contracts such as stock option plans are pervasive will differ from those of more standard real business cycle models.stochastic growth model; business cycles; delegated management

    Improving the Design and Implementation of Software Systems uses Aspect Oriented Programming

    Get PDF
    A design pattern is used as a static reusable component of object oriented design in the many patterns catalogue. The regular design pattern does not show any collaboration of shared resource between patterns in the software design. But generative design pattern is a new design pattern that shows the relationship and shared resources between them. The generative design pattern is considered a dynamic and active design, which creating new design as a result of collaboration and resource usage between two designs. This paper will demonstrate benefit and the structure of generative pattern. It also demonstrates the creation of a desktop application for modeling generative design pattern. The Java language creates the desktop application. The application provides many features, for instance, users can place drawing objects such as class, Interface and Abstract Class object. The users also can draw different connection line between these objects, such as simple, inheritance, composition lines. This project shows the implementation details techniques of drawing objects and their connection. It also provides an open source code that many novice developers can understand and analysis for further development. The application source code gives the developers new ideas and skills in object oriented programming and graphical user interface in Java language
    • 

    corecore