Designing High Integrity Systems Using Aspects

نویسندگان

  • Geri Georg
  • Robert B. France
  • Indrakshi Ray
چکیده

In this paper we show how design-level aspects can be used to develop high integrity systems. In our approach, a system designer must first identify the specific mechanisms required for high integrity systems. To support this activity we have developed an initial tabulation of different kinds of threats and the mechanisms used to prevent, detect, and recover from the related attacks and problems. Each mechanism can be modeled independently as an aspect. After the mechanisms are identified, the corresponding aspects are then woven in the appropriate order into the models of the essential system functionality to produce a model of a high integrity system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Determining the factors affecting the evaluation of business intelligence systems with an emphasis on the integrity of Organizational resources

In the information age, the speed of producing and supplying valuable information is considered as one of the keys to success in the organizations and institutes.The major objective of this study was to investigate and specify the effective factors in evaluating the BI systems with an emphasis on the integrity of organizational resources. First, five factors were determined as the major factors...

متن کامل

Designing a local Flexible Model for Electronic Systems Acquisition Based on Systems Engineering, Case Study: Electronic high-tech Industrial

In this research we have presented a local model for implementing systems engineering activities in optimized acquisition of electronic systems in Electronic High-Tech Industrial. In this regard, after reviewing the literature and the use of documents, articles and Latin books, we have collected system acquisition life cycle models from different resources. after considering the criteria of the...

متن کامل

Towards System Integrity Protection with Graph-Based Policy Analysis

Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security policy and verifying whether an existing policy satisfies security objectives. To efficiently support these, an intuitive and cognitive policy analysis mechanism is desired for policy designers or security administrators due to t...

متن کامل

Designing a Conceptual Pattern to Integrate Urban Spaces Network with the View of “New Urbanism”, Using F’ANP Model, Case Study: District 6 of Tehran

In response to the failure of modernist approach in the new urban ideas, attention to the public spaces in cities has become as a basic necessity in terms of planning and urban design. Study on the concept of urban space as a structural element in the cities, is developing and expanding. Multiple authors have done many studies in this area, and the results indicate that urban areas play a key r...

متن کامل

Dependable Adaptive Computing Systems the Stanford Crc Roar Project

We describe architectures and concurrent error detection, fault-location and recovery techniques for designing reconfigurable systems with high availability, data integrity, and protection from temporary, permanent and common-mode failures. These systems can also be used for unmanned remote applications.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002