• Title/Summary/Keyword: 소프트웨어 개발 생명주기

Search Result 127, Processing Time 0.023 seconds

Design and Evaluation of Agile Framework for Small Projects (소규모 프로젝트를 위한 애자일 프레임워크 설계 및 평가)

  • Lee, Sei-Young;Yong, Hwan-Seung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.851-855
    • /
    • 2009
  • In this paper, the Agile Framework for Small Projects (AFSP) was applied to four industry cases. The AFSP provides a structured way for software organizations to adopt agile practices and evaluate the results. The framework includes an extended serum process and agile practices, based on agility and critical success factors in agile software projects that are selected from Serum, XP, FDD, DSDM and Crystal Clear. The case projects were evaluated, and the analysis of the results clearly showed that the framework used in the aforementioned cases displayed a high degree of efficiency.

A Study on the Reengineering Tool with Concepts Recognition and Logical l Analysis of Objects (객체의 개념적 인식과 논리적 분석에 의한 재공학 툴에 대한 연구)

  • Kim, Haeng-Gon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.200-210
    • /
    • 1996
  • Re-engineering has the potential to improve software productivity and quality y across the entire life cycle. It involves improving the software maintenance process and improving existing systems by applying new technologies and tools to software maintenance. Re-engineering can help us understanding existing systems and discover software components(e.g., design structure, data structure that are common across systems. These common components then can be reused in the development (or redevelopment )of systems, thereby significantly shortening the time and lessening the risk of developing systems. The Object-Oriented paradigm has been known to improve software maintainability. There still exist many problems in recognizing object, attributes and operations that are conceptually integrated and constructing of object class. In this paper, we propose a method that defines a fundamental theories of re-engineering and a concept recognition for object- oriented paradigm. We also describe the re-engineering tool that translates the existing procedure-oriented program into object-oriented system. This tool has a strength to solve the conceptual integrity problem in object-oriented recognition.

  • PDF

A Transforming Technique toward Component-based System from Object-oriented Model Using Static Metrics (객체지향 모델로부터 정적 메트릭을 이용하여 컴포넌트 기반 시스템으로 변환하는 기법)

  • 이은주;신우창;이병정;우치수
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.6
    • /
    • pp.728-740
    • /
    • 2004
  • The increasing complexity and shorter life cycle of software have made it necessary to reuse software. Object-oriented development had not provided extensive reuse and computing infrastructures are evolving from mainframe to distributed environments. However, components provide more advanced means of structuring, describing and developing system, because they are more coarse-grained and have more domain-specific aspects than objects. And they are also suited for distributed environment due to their reusability and granularity. In this paper, we present a process including the static metrics and guidelines that can be applied to transform object-oriented systems into component-based systems. Our process consists of two parts: First, basic components are created based upon composition and inheritance relationships between classes. Second, intermediate system is refined into component-based system with the static metrics and guidelines we propose.

Hazard Analysis Process Based on STPA Using SysML (SysML을 이용한 STPA 기반의 위험원 분석 프로세스)

  • Choi, Na-yeon;Lee, Byong-gul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.1-11
    • /
    • 2019
  • Today's software systems are becoming larger and more complicated, and the risk of accidents and failures have also grown larger. Software failures and accidents in industrial fields such as automobiles, nuclear power plants, railroad industries, etc. may lead to severe damage of property and human life. The safety-related international standards, such as IEC 61508 have been established and applied to industries for decades. The safety life cycle specified in the standards emphasize the activities to develop safety requirements through hazard and risk analysis in the early stage of software development. In this paper, we propose 'Hazard Analysis Process based on STPA using SysML' in order to ensure the safety of software at the early stage of software development. The proposed hazard analysis can be effectively performed minimizing the loss of hazard by using the BDD and the IBD of SysML to define the control structure of a system. The proposed method also improves the specification of the safety constraints(requirement) by using SD. As a result, it is possible to identify the hazard without missing and identify the hazard scenarios in detail, and safety can be sufficiently ensured in the early stage of software development.

A Study on A Web-Based DevOps Platform Using Linux Container (리눅스 컨테이너를 이용한 웹기반의 DevOps 플랫폼 연구)

  • Chung, Geunhoon;Park, Junseok;Lee, Geuk
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.71-80
    • /
    • 2019
  • DevOps is a combining which means giving a diverse environments for software development and operations through whole software lifecycle. The key value of the proposed DevOps platform is the fast and stable service capability for a software development and operation environment. To do this, the DevOps gives pre-embedded 7 programming languages-Java, C/C++, Python, PHP, Ruby, Node.js, goLang and 7 service frameworks - Korea eGov Framework, Spring, Struts, Django, Laravel, Rails, Express. With the DevOps platform, it is possible to develop a software and also to build and distribute operation packages directly with the Linux containers. In this paper, the performance evaluation for a compile time, a distribution time and a processing capability is will be also proved. Though the performance evaluation, this paper shows capabilities of the proposed DevOps for Cloud services with commercial service level, prospectively.

Development and Application of Analysis & Design Methodology for Web-based System (웹 기반 시스템의 분석 및 설계 방법론 개발과 적용)

  • Jung, Byung-Kwon;Kim, Dong-Soo;Song, Jae-Hyeong;Hwang, Chong-Sun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.155-166
    • /
    • 2002
  • Even the short history of the Web system, the technology related to the Web system has been developed rapidly. Yet, the quality of the Web-based application software has not been improved that much. For this reason, the efficient method to develop the Web-based application software is needed. This paper describes the items necessary to develop the Web-based application software. On the basis of ISO/IEC 12207-Software Life Cycle Processes this paper mainly suggests the analysis and design stage of the Web-based model for developing software. Also, this paper describes the methods to define the process and the entity for applying contents to Web-based application software. With the web-based model suggested in this paper the Web-RoadMap Methodology of KCC Information & Communication, a system provider in Korea, has been applied to the public-domain projects. Through the application, Web-RoadMap Methodology has been proved to be an applicable model for analyzing and designing the systems based on the web environments.

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

A Method for Combining Object-Oriented Design Modules (객체 지향 설계 모듈의 결합 방법)

  • Ha, Gye-Beom;Lee, Jong-Seop;Jeong, Gye-Dong;Choe, Yeong-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.817-833
    • /
    • 1996
  • Most object-oriented analysis and design methodologies are based on structured analysis and information modeling and are using for intuitive analysis and design models based on object-oriented programming languages. Therefore there are many problems such as when a system is implemented incorrect semantics and inconsistency between models.This paper submits a decomposition and design method for object, dynamic and functional module of the methodology of a new system development life-cycle. Thus, we present a new system development life cycle, and suggestsa object-oriented design methodand standards of module decomposition for the decomposition of object, dynamic, functional models due to object-oriented design procedures and specifications. This proposed method enables developers to reflect user's software requirements conveniently. We prove the validity and practicality of this object-oriented design method through implementing a real-system.

  • PDF

Process Design and Case Study for Efficient Function Point Measurement Based on Object Oriented (객체지향 기반 효율적인 기능점수 측정 프로세스 설계 및 사례연구)

  • Kim, Dong-Sun;Yoon, Hee-Byung
    • The KIPS Transactions:PartD
    • /
    • v.15D no.3
    • /
    • pp.375-386
    • /
    • 2008
  • Recently, development paradigm of information system is turning into object oriented and component based, and this methodology is leading the software industry. To acclimatize aptly to this trend, users demand the assessment of software expenses to change with the appropriate model of computing costs of the environment, and some people are actually studying the concept of Object Oriented Function Point and UCP method. Especially, Object Oriented Function Point Measurement Process has good points in overcoming the bound of LOC and the existing the Function Point Measurement Process because Object Oriented Function Point Measurement Process is applicable to the early stage of development project mainly with the used cases, and valid to the life long period as the each stage of software products develops, and always understandable to communicate with users by the UML mark rules. Accordingly, this research is to measure Functional Point at ROFP and AOFP in accordance with the development project of information system by the national defense CBD methodology procedures and UML Interrelation Analysis that are recently and widely used in the developmental environment of object oriented information system. Furthermore, this study suggests the measurement method to obtain Functional Point, and identifies service function and object/class function in the correlation analysis of use case and class based on the products and UML modeling via traditional FPA model and object oriented FPA model. Above all, this study is to demonstrate the improvement of traditional Function Point Measurement Process, IFPUG-CPM and software cost basis, and reveal Function Point Measurement Process, which is appropriate to the development of object oriented information system, and suggest the evaluation results of the compatibility through case studies.

Security-Reverse-Attack Engineering Life-cycle Model for Attack System and Attack Specification Models (공격시스템을 위한 보안-역-공격공학 생명주기 모델과 공격명세모델)

  • Kim, Nam-Jeong;Kong, Mun-Soo;Lee, Gang-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.17-27
    • /
    • 2017
  • Recently, as cyber attacks have been activated, many such attacks have come into contact with various media. Research on security engineering and reverse engineering is active, but there is a lack of research that integrates them and applies attack systems through cost effective attack engineering. In this paper, security - enhanced information systems are developed by security engineering and reverse engineering is used to identify vulnerabilities. Using this vulnerability, we compare and analyze lifecycle models that construct or remodel attack system through attack engineering, and specify structure and behavior of each system, and propose more effective modeling. In addition, we extend the existing models and tools to propose graphical attack specification models that specify attack methods and scenarios in terms of models such as functional, static, and dynamic.