8 research outputs found

    Gestion contextualisée de la sécurité : implémentation MDS@Runtime avec FraSCAti

    Get PDF
    National audienceThe development of security policies for information systems is usually based on a systematic risks analysis, reducing them by adopting appropriate countermeasures. These risks analysis approaches are complex and designed for well-known and static environments. To overcome this limit, we propose to extend the Model Driven Security (MDS) approach to a MDS@Runtime vision to set a Security as a Service component. Plugged on the FraSCAti middleware, our security component selects, composes and orchestrates the security services depending on the execution context to avoid both under and over protection

    UML-SOA-Sec and Saleem’s MDS Services Composition Framework for Secure Business Process Modelling of Services Oriented Applications

    Get PDF
    In Service Oriented Architecture (SOA) environment, a software application is a composition of services, which are scattered across enterprises and architectures. Security plays a vital role during the design, development and operation of SOA applications. However, analysis of today’s software development approaches reveals that the engineering of security into the system design is often neglected. Security is incorporated in an ad-hoc manner or integrated during the applications development phase or administration phase or out sourced. SOA security is cross-domain and all of the required information is not available at downstream phases. The post-hoc, low-level integration of security has a negative impact on the resulting SOA applications. General purpose modeling languages like Unified Modeling Language (UML) are used for designing the software system; however, these languages lack the knowledge of the specific domain and “security” is one of the essential domains. A Domain Specific Language (DSL), named the “UML-SOA-Sec” is proposed to facilitate the modeling of security objectives along the business process modeling of SOA applications. Furthermore, Saleem’s MDS (Model Driven Security) services composition framework is proposed for the development of a secure web service composition

    OEXP exploration studies technical report. Volume 3: Special reports, studies, and indepth systems assessments

    Get PDF
    The Office of Exploration (OEXP) at NASA has been tasked with defining and recommending alternatives for an early 1990's national decision on a focused program of manned exploration of the Solar System. The Mission analysis and System Engineering (MASE) group, which is managed by the Exploration Studies Office at the Johnson Space Center, is responsible for coordinating the technical studies necessary for accomplishing such a task. This technical report, produced by the MASE, describes the process used to conduct exploration studies and discusses the mission developed in a case study approach. The four case studies developed in FY88 include: (1) a manned expedition to PHOBOS; (2) a manned expedition to MARS; (3) a lunar surface observatory; and a lunar outpost to early Mars evolution. The final outcome of this effort is a set of programmatic and technical conclusions and recommendations for the following year's work

    Less realism : more meaning : evaluating imagery for the graphic designer

    Get PDF
    Typography\u27 as a defining term has become interchangcable with \u27graphic design\u27. and while font choice and application is seen as of paramount importance. image choice, virtually half , . of the communication design equation, is neglected in the theory and in pratice is left to the instinct of the designer. In this thesis I try to find approaches for graphic designers to understand image to the degree that they understand type. These approaches are tested through assignments for graphic design students and the results recorded and analysed. I seek to address the paradox that we are able to communicate more accurately through less accurately rendered images. I will explain how the human visual system. evolved over time by looking only upon the natural world in all its reality. can look upon a stick-figure and make an emotional and intellectual connection. I examine the design implications of this strange faculty of the visual system. Gombrich. Arnheim and others have explored realism in, and applied psychology to, art in order to become better art historians. I explore the implications in the more pragmatic. economically imperative field of design of moving away from realism in the visual aspects of communication

    Learning, innovation and technical change

    Get PDF
    Meeting: Research and Policy Workshop on Technology Problems for the Caribbean, November 13-December 10, 1983, Runaway Bay, JMTitle supplied by cataloguerLIBHAS: 1-2, 5-6, 8, 11-16, 18, 20-22, 24, 27, 29-32, 34, 36-38, 40-43, 46-48, 51, 53-65, 67-69, 7

    Third International Conference on Inverse Design Concepts and Optimization in Engineering Sciences (ICIDES-3)

    Get PDF
    Papers from the Third International Conference on Inverse Design Concepts and Optimization in Engineering Sciences (ICIDES) are presented. The papers discuss current research in the general field of inverse, semi-inverse, and direct design and optimization in engineering sciences. The rapid growth of this relatively new field is due to the availability of faster and larger computing machines
    corecore