932 research outputs found

    A Set of Refactoring Rules for UML-B Specifications

    Get PDF
    UML-B is a graphical formal modelling notation which is based on UML and relies on Event-B and its verification tools. In this paper, we propose annealing and introduce subtyping rules as well-known refactoring rules which can improve and assist the derivation of object-oriented design from an abstract specification written in UML-B. We prove that the proposed annealing rules are behavior preserving. We also demonstrate the applicability and effectiveness of our refactoring rules by applying them on two UML-B specifications

    Dynamic Assembly for System Adaptability, Dependability, and Assurance

    Get PDF
    (DASASA) ProjectAuthor-contributed print ite

    Race riots on the beach: A case for criminalising hate speech?

    Get PDF
    noThis paper analyses the verbal and textual hostility employed by rioters, politicians and the media in Sydney (Australia) in December 2005 in the battle over Sutherland Shire¿s Cronulla Beach. By better understanding the linguistic conventions underlying all forms of maledictive hate, we are better able to address the false antimonies between free speech and the regulation of speech. It is also argued that understanding the harms of hate speech provides us with the tools necessary to create a more responsive framework for criminalising some forms of hate speech as a preliminary process in reducing or eliminating hate violence

    A Novel Taxonomy of Opportunities and Risks in Massively Multiplayer Online Role Playing Games

    Get PDF
    The explosion and rapid embrace of Massively Multiplayer Online Role Playing Games (MMORPG) has provided players with unique, fully immersive three dimensional environments in which they can express themselves in a myriad of ways. Players can develop unique skill sets, share knowledge, explore and experiment with various identities and network with like-minded individuals. Evidence suggests however, that these opportunities are accompanied with a number of risks including addiction, desensitisation and threats to the privacy of personal information. This paper presents a novel Taxonomy of opportunities and risks in the specific context of Massively Multiplayer Online Role Playing Games

    Formal Methods Specification and Analysis Guidebook for the Verification of Software and Computer Systems

    Get PDF
    This guidebook, the second of a two-volume series, is intended to facilitate the transfer of formal methods to the avionics and aerospace community. The 1st volume concentrates on administrative and planning issues [NASA-95a], and the second volume focuses on the technical issues involved in applying formal methods to avionics and aerospace software systems. Hereafter, the term "guidebook" refers exclusively to the second volume of the series. The title of this second volume, A Practitioner's Companion, conveys its intent. The guidebook is written primarily for the nonexpert and requires little or no prior experience with formal methods techniques and tools. However, it does attempt to distill some of the more subtle ingredients in the productive application of formal methods. To the extent that it succeeds, those conversant with formal methods will also nd the guidebook useful. The discussion is illustrated through the development of a realistic example, relevant fragments of which appear in each chapter. The guidebook focuses primarily on the use of formal methods for analysis of requirements and high-level design, the stages at which formal methods have been most productively applied. Although much of the discussion applies to low-level design and implementation, the guidebook does not discuss issues involved in the later life cycle application of formal methods

    Extracting meanings of event tourist experiences: A phenomenological exploration of Limassol carnival

    Get PDF
    The common examination of the event and tourism experience can reveal the attached meanings that exemplify the valued characteristics of a destination in the perceptions of tourists. From this standpoint, this study employed a phenomenological approach conducting eight unstructured interviews to explore the experience and assigned meanings of tourists who attended the carnival in Limassol, Cyprus. Results indicate that the meanings of tourist experiences in the carnival were extracted as continuously evolving products shaped by the interaction of two interrelated dramaturgical states, namely the generalized sociality and perceived community metamorphosis, and the interfering dimension of obstruction referring to organizational aspects constraining the tourist experience. The findings of this exploratory phenomenological study bring into the fore the need for more effectively incorporating events into a destination's product mix by designing experiences that leverage event meanings in synergy with unique destination features, thereby enhancing their impact on tourists. On these grounds, it is argued that the phenomenological perspective applied on the study of event tourism can enable destination marketing and management to develop a joint framework for cross-leveraging events and destination assets, hence, synergistically optimizing both social and tourism ends for host destinations. To this end, the study highlights the need for future research to start exploring systematically the relationship between the meanings of tourist experiences and the characteristics of a destination's product mix

    Quantifying the security risk of discovering and exploiting software vulnerabilities

    Get PDF
    2016 Summer.Includes bibliographical references.Most of the attacks on computer systems and networks are enabled by vulnerabilities in a software. Assessing the security risk associated with those vulnerabilities is important. Risk mod- els such as the Common Vulnerability Scoring System (CVSS), Open Web Application Security Project (OWASP) and Common Weakness Scoring System (CWSS) have been used to qualitatively assess the security risk presented by a vulnerability. CVSS metrics are the de facto standard and its metrics need to be independently evaluated. In this dissertation, we propose using a quantitative approach that uses an actual data, mathematical and statistical modeling, data analysis, and measurement. We have introduced a novel vulnerability discovery model, Folded model, that estimates the risk of vulnerability discovery based on the number of residual vulnerabilities in a given software. In addition to estimating the risk of vulnerabilities discovery of a whole system, this dissertation has furthermore introduced a novel metrics termed time to vulnerability discovery to assess the risk of an individual vulnerability discovery. We also have proposed a novel vulnerability exploitability risk measure termed Structural Severity. It is based on software properties, namely attack entry points, vulnerability location, the presence of the dangerous system calls, and reachability analysis. In addition to measurement, this dissertation has also proposed predicting vulnerability exploitability risk using internal software metrics. We have also proposed two approaches for evaluating CVSS Base metrics. Using the availability of exploits, we first have evaluated the performance of the CVSS Exploitability factor and have compared its performance to Microsoft (MS) rating system. The results showed that exploitability metrics of CVSS and MS have a high false positive rate. This finding has motivated us to conduct further investigation. To that end, we have introduced vulnerability reward programs (VRPs) as a novel ground truth to evaluate the CVSS Base scores. The results show that the notable lack of exploits for high severity vulnerabilities may be the result of prioritized fixing of vulnerabilities
    corecore