25 research outputs found

    Applying tropos to socio-technical system design and runtime configuration

    Get PDF
    Recent trends in Software Engineering have introduced the importance of reconsidering the traditional idea of software design as a socio-tecnical problem, where human agents are integral part of the system along with hardware and software components. Design and runtime support for Socio-Technical Systems (STSs) requires appropriate modeling techniques and non-traditional infrastructures. Agent-oriented software methodologies are natural solutions to the development of STSs, both humans and technical components are conceptualized and analyzed as part of the same system. In this paper, we illustrate a number of Tropos features that we believe fundamental to support the development and runtime reconfiguration of STSs. Particularly, we focus on two critical design issues: risk analysis and location variability. We show how they are integrated and used into a planning-based approach to support the designer in evaluating and choosing the best design alternative. Finally, we present a generic framework to develop self-reconfigurable STSs

    EVALUASI PENENTUAN PERSONIL IT INFRASTRUKTUR PADA TNI AL MENGGUNAKAN KOMBINASI METODE AHP DAN VIKOR

    Get PDF
    In the current development of technology, information technology is not only used in the economic field, but is divided into various fields, including the military world of the Navy.  In order to promote the capability of human resources in the field of IT infrastructure in the Navy, it is necessary to select the right personnel in the maintenance of IT infrastructure assets, so as to obtain competent personnel output in answering future challenges. To facilitate the determination of the right IT infrastructure personnel, the author implements a system by combining the AHP and Vikor methods based on Python. The AHP method is used to determine the weight of criteria in the selection of IT personnel, and the Vikor method is used to rank the appropriate IT personnel. With this system, it is hoped that it can be a supporting application to help select IT personnel according to tactical, technical, strategic criteria.Dalam Perkembangan Teknologi Saat ini, Teknologi informasi tidak hanya digunakan dalam bidang ekonomi namun terbagi menjadi beberapa bidang termasuk dalam dunia militer TNI AL.  Untuk membina kemampuan SDM dalam bidang Infrastruktur IT pada TNI AL, dibutuhkan pemilihan personil yang tepat dalam menjaga asset infrastruktur IT, sehingga didapatkan keluaran SDM yang kompeten dalam menjawab tantangan ke depan. Untuk mempermudah penentuan personil IT Infrastruktur yang tepat penulis melakukan implementasi sistem dengan melakukan kombinasi metode AHP dan Vikor berbasis Python. Metode AHP akan digunakan sebagai penentuan bobot dari kriteria dalam pemilihan personil IT dan Metode Vikor untuk melakukan perangkingan terkait personil IT yang sesuai. Dengan adanya system ini diharapkan dapet menjadi aplikasi pendukung untuk membantu pemilihan personil IT yang sesuai dengan kriteria Taktis , Teknis, Strategis

    Study and Analysis of End-to-End Encryption Message Security Using Diffie-Hellman Key Exchange Encryption

    Get PDF
    The development of the field of communication has progressed rapidly. One example is a message exchange application like Whatsapp. The advancement of technology and innovation in the field of communication has allowed us to connect with people around the world in an easier and faster way. However, with advances in communication technology, new challenges arise related to information security and privacy of messages that have been sent. One solution to overcome this problem is to apply Cryptographic Techniques. In cryptography, data sent over the network will be disguised in such a way with encryption techniques so that even if the data can be read, it cannot be understood by unauthorized parties. The data to be sent without being encoded is known as plaintext, and after being disguised in an encoding way, this plaintext will turn into ciphertext. The method chosen for this journal is the Diffie-Hellman Key Exchange. In this journal, an analysis will be carried out regarding the end-to-end process of securing encrypted messages using the Python programming language

    Audio, Text, Image, and Video Digital Watermarking Techniques for Security of Media Digital

    Get PDF
    The proliferation of multimedia content as digital media assets, encompassing audio, text, images, and video, has led to increased risks of unauthorized usage and copyright infringement. Online piracy serves as a prominent example of such misuse. To address these challenges, watermarking techniques have been developed to protect the copyright of digital media while maintaining the integrity of the underlying content. Key characteristics evaluated in watermarking methods include capability, privacy, toughness, and invisibility, with robustness playing a crucial role. This paper presents a comparative analysis of digital watermarking methods, highlighting the superior security and effective watermark image recovery offered by singular value decomposition. The research community has shown significant interest in watermarking, resulting in the development of various methods in both the spatial and transform domains. Transform domain approaches such as Discrete Cosine Transform, Discrete Wavelet Transform, and Singular Value Decomposition, along with their interconnections, have been explored to enhance the effectiveness of digital watermarking methods

    Uncertainty Dimensions of Risks in Secure and Dependable Domain

    Get PDF
    Most of the critical aspects for secure and dependable systems, such as safety, integrity, availability, are related to uncertainty. Literature proposes many approaches to deal with uncertainty, mainly in the area of risk management and safety&reliability engineering. However, what is still missing is a clear understanding of the nature of uncertainty that very often has produced mistreatments in the design. In this paper, we propose a conceptual model for uncertainty that can be used to deal with systems’ qualities such as security and dependability. Particularly, we will consider the relation between uncertainty-risk and how risk affects several quality attributes of the system. This understanding is necessary for the evaluation of design alternatives. We use a case study in Air Traffic Management to illustrate our approach

    Modelling and Analysing Risk at Organizational Level

    Get PDF
    Modeling and analyzing risk is one of the most critical activity in system engineering and approaches like Fault Tree Analysis, Event Tree Analysis, Failure Modes and Criticality Analysis have been proposed in literature. All these approaches focus on the system-to-be without considering the impact of the associated risks to the organization where the system will operate. On the other hand, the tendency is more and more to consider software development as a part of organizational development. In this paper, we propose a framework to model and reason about risk at organizational level, namely considering the system-to-be along the organizational setting. The framework extends Tropos, a methodology that has been proved effective in modeling strategic interests of the stakeholders at organizational level. We introduce a number of different means that help the analyst to identify and enumerate relevant treatments for risk mitigation. Experimental results are finally presented and discussed

    Modelling Risk and Identifying Countermeasure in Organizations

    Get PDF
    Modelling and analysing risk is one of the most critical activity in system engineering. However, in literature approaches like Fault Tree Analysis, Event Tree Analysis, Failure Modes and Criticality Analysis focus on the system-to-be without considering the impact of the associated risks to the organization where the system will operate. The Tropos framework has been proved effective in modelling strategic interests of the stakeholders at organizational level. In this paper, we introduce the extended Tropos goal model to analyse risk at organization level and we illustrate a number of different techniques to help the analyst in identifying and enumerating relevant countermeasures for risk mitigation

    Risk Analysis as part of the Requirements Engineering Process

    Get PDF
    In software engineering, risk is usually considered and analyzed during, or even after, the system design. Countermeasures are elaborated and then accommodated as a refinement of the design, when a limited number of changes are still possible and they may introduce the problem of revisiting the initial requirements. In this paper, we propose a goal-oriented approach for modeling and reasoning about risk during the requirements analysis process. Risks are introduced and analyzed along the stakeholders' goals and countermeasures are introduced as part of the system's requirements. The approach extends the Tropos formal framework with new concepts and qualitative risk reasoning mechanisms. We use a case study on loan origination process to illustrate the proposal

    Analyzing Risk-Countermeasure in Organizations: a Quantitative Approach

    Get PDF
    Risk is one of inherent problems in all software systems. It becomes more significant if the software system is operated in a critical system (e.g., air traffic control, nuclear plant). It is because in this domain the software system is expected to be always dependable all the time of its operation. The system is dependable when all its risks are suppressed until acceptable level. Therefore, in such setting analysts must carefully analyze the socio-technical system (i.e., organizational-setting and software systems) and understand how uncertain events may affect the systems. By means of the Tropos Goal-Risk, we model the socio-technical system including its risks. Essentially, the framework consists of goal, event, and treatment modeling. The goal layer represents what the stakeholders' interests are and how to achieve them. The event layer depicts how uncertain events occur and impact the goals of stakeholders. The treatment layer represents what the possible measures that are available to treat the events. By quantifying the evidence value of the model, analysts can reason about the level of risk and choose the most appropriate alternative to achieve the stakeholders' interests and the necessary treatment that should be employed to mitigate the risks. We use a case study on Air Traffic Management to illustrate the proposal

    Reasoning about Risk in Agent's Deliberation Process: a Jadex Implementation

    Get PDF
    Autonomous agents and multi-agent systems have been proved to be useful in several safety-critical applications. However, in current agent architectures (particularly BDI architectures) the deliberation process does not include any form of risk analysis. In this paper, we propose guidelines to implement Tropos Goal-Risk reasoning. Our proposal aims at introducing risk reasoning in the deliberation process of a BDI agent so that the overall set of possible plans is evaluated with respect to risk. When the level of risk results too high, agents can consider and introduce additional plans, called treatments, that produce an overall reduction of the risk. Side effects of treatments are also considered as part of the model. To make the discussion more concrete, we illustrate the proposal with a case study on the Unmanned Aerial Vehicle agent
    corecore