• Title/Summary/Keyword: 유즈 케이스

Search Result 35, Processing Time 0.019 seconds

Methods to Design Provided, Required and Customize Interfaces of Software Components (소프트웨어 컴포넌트의 Provided, Required와 Customize인터페이스 설계 기법)

  • 박지영;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.10
    • /
    • pp.1286-1303
    • /
    • 2004
  • Component-based Development is gaining a wide acceptance as an economical software development paradigm to develop applications by utilizing reusable software components. Well-defined interface manages coupling and cohesion between components, minimizes the effect on the user in case of component evolvement, and enhances reusability, extendibility and maintainability. Therefore, study on systematic development process and design guidelines for component interface has been required since the component has been introduced. In this paper, we propose three types of interfaces based on software architecture layers and functionality types; Provided Interface which provides functionality of a component, Required Interface which specifies required functionality that is provided by other components, and Customize Interface which tailors the component to customer's requirement. In addition, we suggest design criteria for well-designed interface, and systematic process and instructions for designing interface. We firstly cluster operations extracted from use case model and class model to identify Provided interfaces, and design Customize interfaces based on artifacts for variability. We also specify Required interfaces by identifying dependency among interfaces. Proposed interface design method provides traceability, throughout the component interface design. And furthermore, proposed guidelines support practical design for high quality component based on a case study.

Requirements analysis and Use-case realization using Macrostruktur (거시구조 개념을 이용한 요구사항 분석과 Use-case 도출 방법)

  • Cho, Yong-Kyun;Bak, Yong-Ik;Park, Young-Bom
    • The KIPS Transactions:PartD
    • /
    • v.18D no.6
    • /
    • pp.433-442
    • /
    • 2011
  • As software is varied and grew in size, the importance of clear understanding and representing customer's need, has been emphasized. It is not easy to drive and define critical system needs, since requirements in early stage of the development, is and conceptual. Technical perspective view, Several theoretical analysis methods and validation techniques are introduced, but in practice, it is hard to drive clear customer's requirement. In this paper, to drive clear customer's requirements, Macrostruktur concept of textlinguistics is used. First, Macrostruktur of textlinguistics is used to analysis descriptive requirements. Second, Macrostruktur-rule is applied to analyzed Macrostruktur data in order to derive Macrostruktur-propositions. Finally, it is proposed to generating Use-case model using derived Macrostruktur-propositions.

Modeling Adaptive Context-Based Contents Navigation of Web Applications (웹 응용의 적응하는 문맥 기반 컨텐츠 항해 모델링)

  • Lee, Byung-Jeong;Hong, Ji-Won
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.93-106
    • /
    • 2007
  • Web Applications are rapidly increasing and the structure becomes very complicated. However, when users explore such complex Web applications, they cannot often grasp the current location and get the information that they want. Therefore, a novel approach to model the navigation of Web application contents is required. In this study, a framework has been presented for modeling adaptive context-based contents navigation of Web applications. The framework performs activities including navigation analysis, navigation design, and navigation realization. first, in navigation analysis domain is analyzed by using use case, focusing on navigation. Next, in navigation design three models have been produced: a navigation information model, a profile, and a navigation interface model. Finally, in navigation realization a Webpage navigation model and a component navigation model have been produced. In this work, several formal definitions and rules for checking validity of navigation model have also been provided.

  • PDF

POSCAL : A Protocol of Service Access Control by Authentication Level (인증 수준에 의한 서비스 접근제어 프로토콜)

  • Yoo, SeongMin;Choi, SeokJin;Park, JunHoo;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1509-1522
    • /
    • 2018
  • The purpose of this study is to support flexible authentication functions in various services using various types of user information. Rather than requiring the same level of authentication for all services, the goal is to identify the level of authentication at the time of user authentication and to increase convenience and efficiency by dynamically granting authority. In this paper, we propose POSCAL (Protocol of Service Control by Authentication Level) protocol which can control service access based on various local authentication information. To verify the function of the authentication framework, we developed the electronic wallet service based on the POSCAL authentication framework and evaluated the implementation function based on the use case scenario. The proposed protocol satisfies user and message authentication, confidentiality of authentication information, integrity of authentication history, non - repudiation of authorization, and access control by service according to security level.

A Study on Operating the IaaS Cloud Computing in view of Integrated Security Management System (통합보안관리시스템을 고려한 IaaS 클라우드 컴퓨팅 운영에 관한 연구)

  • Choi, Ju-Young;Park, Choon-Sik;Kim, Myuhng-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.141-153
    • /
    • 2012
  • In the recent years, various researches on the use cases of the cloud computing service have been achieved for its standardization. Notwithstanding, we need more additory effort to refine the operating mechanisms on the cloud computing environment. In this paper, we suggest an operating mechanism on IaaS cloud computing environment that is related to the integrated security management system. By using CloudStack 2.2.4 toolkit, we have built a test-bed for IaaS cloud computing service i.e., SWU-IaaS cloud computing environment. Through operating this hierarchical SWU-IaaS cloud computing environment, we have derived the attributes and the methods of its components. Its scenarios can be described in case of both normal state and abnormal state. At the end, a special scenario has been described when it receives a security event from the integrated security management system.