## Abstract In the aftermath of the tragic events of 11 September 2001, numerous changes have been made to aviation security policy and operations throughout the nation's airports. The allocation and utilization of checked baggage screening devices is a critical component in aviation security syste
Modeling and performance analysis for security aspects
โ Scribed by Lirong Dai; Kendra Cooper
- Publisher
- Elsevier Science
- Year
- 2006
- Tongue
- English
- Weight
- 899 KB
- Volume
- 61
- Category
- Article
- ISSN
- 0167-6423
No coin nor oath required. For personal study only.
โฆ Synopsis
The problem of effectively designing and analyzing software to realize non-functional requirements is an important research topic. The significant benefits of such work include detecting and removing defects earlier, reducing development time and cost while improving the system's quality. The Formal Design Analysis Framework (FDAF) is an aspect-oriented approach that supports the design and analysis of multiple non-functional properties for distributed, real-time systems. In this paper, a security attribute, data origin authentication, is defined as a reusable aspect based on its security pattern definition. The FDAF provides a UML extension to weave the security aspect into a UML architecture design. This is accomplished by abstracting Aspect-Oriented Programming concepts join point and advice up to the design level. The FDAF supports the automated translation of a UML architecture design into Rapide [D.
๐ SIMILAR VOLUMES
A performance analysis methodology for correlated parallel computations based on statistical theory is proposed. Divide-and-conquer strategy is widely used in solving problems in parallel by partitioning and allocating a number of given tasks to available computing resources. When the tasks exhibit
This paper presents a BCMP-type closed queuing network which models the error recovery defined as HDLC based protocols such as LAPB, LAPD, and LLC type 11. Throughput and average end-toend delay against the I-frame loss probability owing to bit errors are obtained by using the queuing network. With
## Abstract Secure attachment is a healthy attachment style that enables individuals to work autonomously as well as with others when appropriate. Secure attachments are characterized by internal regulatory mechanisms that allow individuals to be flexible and constructive in their interpersonal rel