๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Modeling and performance analysis for security aspects

โœ Scribed by Lirong Dai; Kendra Cooper


Publisher
Elsevier Science
Year
2006
Tongue
English
Weight
899 KB
Volume
61
Category
Article
ISSN
0167-6423

No coin nor oath required. For personal study only.

โœฆ Synopsis


The problem of effectively designing and analyzing software to realize non-functional requirements is an important research topic. The significant benefits of such work include detecting and removing defects earlier, reducing development time and cost while improving the system's quality. The Formal Design Analysis Framework (FDAF) is an aspect-oriented approach that supports the design and analysis of multiple non-functional properties for distributed, real-time systems. In this paper, a security attribute, data origin authentication, is defined as a reusable aspect based on its security pattern definition. The FDAF provides a UML extension to weave the security aspect into a UML architecture design. This is accomplished by abstracting Aspect-Oriented Programming concepts join point and advice up to the design level. The FDAF supports the automated translation of a UML architecture design into Rapide [D.


๐Ÿ“œ SIMILAR VOLUMES


Modeling and analyzing multiple station
โœ Sheldon H. Jacobson; Laura A. McLay; John E. Kobza; Jon M. Bowman ๐Ÿ“‚ Article ๐Ÿ“… 2005 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 130 KB

## Abstract In the aftermath of the tragic events of 11 September 2001, numerous changes have been made to aviation security policy and operations throughout the nation's airports. The allocation and utilization of checked baggage screening devices is a critical component in aviation security syste

Performance modeling and analysis of cor
โœ Wei-Ming Lin ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 330 KB

A performance analysis methodology for correlated parallel computations based on statistical theory is proposed. Divide-and-conquer strategy is widely used in solving problems in parallel by partitioning and allocating a number of given tasks to available computing resources. When the tasks exhibit

Queuing network modeling for performance
โœ Takashi Ikegawa ๐Ÿ“‚ Article ๐Ÿ“… 1993 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 694 KB

This paper presents a BCMP-type closed queuing network which models the error recovery defined as HDLC based protocols such as LAPB, LAPD, and LLC type 11. Throughput and average end-toend delay against the I-frame loss probability owing to bit errors are obtained by using the queuing network. With

Secure attachment: implications for hope
โœ Bret L. Simmons; Janaki Gooty; Debra L. Nelson; Laura M. Little ๐Ÿ“‚ Article ๐Ÿ“… 2009 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 131 KB

## Abstract Secure attachment is a healthy attachment style that enables individuals to work autonomously as well as with others when appropriate. Secure attachments are characterized by internal regulatory mechanisms that allow individuals to be flexible and constructive in their interpersonal rel