7 research outputs found

    Evolution of security engineering artifacts: a state of the art survey

    Get PDF
    Security is an important quality aspect of modern open software systems. However, it is challenging to keep such systems secure because of evolution. Security evolution can only be managed adequately if it is considered for all artifacts throughout the software development lifecycle. This article provides state of the art on the evolution of security engineering artifacts. The article covers the state of the art on evolution of security requirements, security architectures, secure code, security tests, security models, and security risks as well as security monitoring. For each of these artifacts the authors give an overview of evolution and security aspects and discuss the state of the art on its security evolution in detail. Based on this comprehensive survey, they summarize key issues and discuss directions of future research

    A Model-Based Approach To Configure and Reconfigure Avionics Systems

    No full text
    International audienceAircraft manufacturers have been moving toward the Integrated Modular Avionics (IMA) approach to reduce the number of dedicated boxes in the aircraft. Standards such as as DO178B or ARINC 653 must be followed during design, configuration or certification of IMA systems. Productivity and costs must also be improved while preserving conformance to standards. For instance, development process of avionics systems involves several system representations and representation transformations are done manually. Moreover, the complexity of new generation of safety-critical systems has also increased the complexity of their development. The authors present their component-based approach which relies on an appropriate modeling language (AADL) combined with modeling patterns to represent, configure and deploy an IMA system. It reduces costs by detecting errors earlier and prevents specifications revisions. Their code generator reduces memory footprint and improves code coverage. One last benefit is a possible automatic certification

    Nano-island fabrication by electron beam lithography and selective oxidation ofAl-rich AlGaAs layers for single electron device application

    No full text
    A nanometer-scale island embedded between two tunnel junctions constitutes the elementary cell of single electron devices (SED), such as single electron transistors (SET) and memories. In this work we report on a new method for the fabrication of a nanometer-scale semiconductor island through AlGaAs/GaAs epitaxial growth, electron beam lithography and selective oxidation of Al-rich AlGaAs layers. We have used a combination of high-resolution electron beam lithography and selective oxidation of Al-rich AlGaAs layers in order to fabricate a non-oxidized semiconductor island smaller than the electron beam lithography (EBL) defined size. The pattern was transferred down to the bottom AlAs layer and a selective oxidation of the Al-rich layers was performed in water vapor at a temperature of 300 °C, which led to the formation of the aluminum oxide. The higher oxidation rate of the AlAs compared to the Al0.8Ga0.2As layer, together with the strain accumulation in the Al0.8Ga0.2As, caused the formation of nanoscale semiconductor islands embedded in an aluminum oxide shell. After the oxidation and cleavage of the sample, selective wet etching has been performed in order to evidence the unoxidized region through an SEM inspection

    Personality, internet addiction, and other technological addictions: an update of the research literature

    No full text
    There has been a significant shift from the view that addictions are disorders involving compulsivedrug usage to a view that non-substance related behaviors may now be considered addictions. Thereis evidence to suggest that people are showing signs of addiction to non-substance-related behaviors.Research into technological addictions, such as internet addiction, smartphone addiction and socialnetworking addiction has exponentially increased over the last decade. Understanding how technologicaladdictions relate to personality and key individual differences is important. This chapter providesrenewed empirical and conceptual insights into technological addictions and how they may be relatedto different personality types and key individual differences. The complex nature of personality andtechnological addictions is discussed together with areas for future research
    corecore