• Title/Summary/Keyword: 컴포넌트 참조 모델

Search Result 32, Processing Time 0.036 seconds

Extraction and Specification of Requirements for Intrusion Tolerant Software Modeling (침입감내 소프트웨어 모델링을 위한 요구사항 추출 및 명세)

  • 조은숙;이강신
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.1
    • /
    • pp.51-63
    • /
    • 2004
  • Current distributed systems are attacked from the outside as well as in which new intrusions are occurred. In particular there is a growing but largely unnoticed intrusion threat due to the emerging middleware technologies such as CORBA, WAP, XML support, and enterprise application integrators. In order to cope with these attacks, intrusion tolerance technology is introduced. Intrusion tolerance technology means that it can provide services normally although attacks are occurred into system. There are intrusion tolerance architectures such as ITUA, HACQIT, SITAR, and so on as a part of DARPA project. In this paper, we analyze and discuss existing intrusion tolerance architectures with respect to intrusion tolerance technology. Also, we extract intrusion tolerant requirements, which are required to develop ,intrusion tolerant system. We propose UML-IT(Intrusion Tolerance) profiles and specify intrusion tolerant software by applying UML-IT profiles.

  • PDF

A Design and Adaptation Technique of UML-based Layered Meta-Model for Component Development (컴포넌트 개발을 위한 UML 기반의 계층형 메타 모델 설계 및 적용기법)

  • Lee, Sook-Hee;Kim, Chul-Jin;Cho, Eun-Sook
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.2
    • /
    • pp.59-69
    • /
    • 2006
  • Component-based software development is introduced as a new development paradigm in software development method. This approach is different from existing software development approach because it is based on reusable and autonomous unit, component. Therefore, component-based development(CBD)is divided into two stages; component development process and component assembly process; application development process. Component development process is the core of CBD because component has a key for good software. Currently many methodologies or tools have been introduced by various academies or industries. However, those don't suggest systematic and flexible modeling techniques adaptable easily into component development project. Existing approaches have a unique orarbitrary modeling technique or provide heuristic guidelines for component modeling. As a result, many component developers are faced with a difficult problems; how to developcomponent models, when develop which diagrams, and so on. In order to address this problem, we suggest a meta-model driven approach for component development in this paper. We provide meta-models according to both layer and development phase. We expect that suggested meta-models allow component developers to develop appropriate models of the time.

  • PDF

XML Key Information Service Modeling for Secure Electronic Commerce (안전한 전자상거래를 위한 XML 키 정보 서비스 모델링)

  • 박남제;문기영;송유진
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.241-257
    • /
    • 2003
  • XML is a global standard for the Internet and e-business, and its use is growing in proportion to the spreading speed of e-Commerce. Thus, a policy for providing more safe security service for exchanging e-documents within e-Commerce is necessary. XKMS, one of XML security specification, defines the protocol for distributing and registering public keys for verifying electronic signatures and enciphering e-documents of e-Commerce applications with various and complicate functions. In this paper, we propose X-KISS service reference model and implement service component based on standard specification. Also describes the analysis and security of XML key information service for safe e-Commerce, paying attention to the features of XML based security service. This reference model supported include public key location by given identifier information, the binding of such keys to identifier information. The client service component controls the number of locate threads and validate threads to analyze the minimum requirements of real-time key retrievals. This service modeling offers the security construction guideline for future domestic e-business frameworks.

  • PDF

A Study on the Water Resources Geographical Information System Based on Network Component (Network 컴포넌트 기반의 수자원지리정보시스템에 관한 연구)

  • Kim, Kyung Tak;Kim, Joo Hun;Choi, Yun Seok;Park, Dong Sun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.6 no.4
    • /
    • pp.122-134
    • /
    • 2003
  • In recent, different kinds of nationwide thematic map have been developed based on NGIS, and each related research field has tried to develop GIS by utilizing this map. Also, Many researches on the geographic information data model has been conducted to improve the compatibility of developed system. The developed system in water resource field should reflect the dynamic characteristics of river flow. Because it should be considered from the design of data model, this study suggests the datamodel for designing geographical information database on water resources which is possible to linear reference capacity based on stream network. In order to examine the applicability of the suggested model, network component based system has developed. Finally, the river network based system shows the superiority in terms of its applicability comparing with other system.

  • PDF

A Study on the Development of Standard Profiles Management System which supports the Technical Reference Model for Information Technology Architecture (정보기술 아키텍처를 위한 기술참조모델을 지원하는 표준프로파일 관리시스템 개발에 관한 연구)

  • Yang, Jin-Hyeok;Kim, Yeong-Do;Jeong, Hui-Jun;Yang, Jin-Yeong;Yu, Myeong-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.665-672
    • /
    • 2001
  • ITA (Information Technology Architecture) satisfies the requirements of information system, supports the information used in the institution's business to guarantee the interoperability and security, and analyzes the components of information system. ITA consists of EA (Enterprise Architecture), TRM (Technical Reference Manual) and SP (Standard Profile). The SP, one of the major components of ITA, is a set of information technology standards. In this paper, to construct and utilize the ITA, we mention the applications of information technology about the SP system implementation based on the TRM. The SP management system implemented in this paper is the first trial in Korea, and designs the software with object oriented programming languages such as JSP and Java. Moreover the basic and detailed specification based on the UML notation, system design using the component and system design pattern consisting of software architectures enhance the software reusability. And the constructed system in this paper shows less maintenance cost by using the public softwares such as Linux system, Korean DBMS, Apache and Tomcat, etc. Finally, the system includes the SP reference system which is used in the other institutions and cannot be found in other institutions. Also it includes the additional diverse service modules which support the subsequent processing for the establishment and revision of standards via internet.

  • PDF

Component Selection Decision Method Using ANP Technique in Change Management (변경관리에서 ANP기법을 이용한 컴포넌트 선택 결정 방법)

  • Kim, Kyoung-Hun;Song, Young-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.1
    • /
    • pp.59-67
    • /
    • 2012
  • Software change management is focused on the change of a entity like the change of contents of a system or a document. In change management, interactive relationship among requirements and complex decision making is needed to obtain optimized status. In this paper we design a management model of software change management in distributed environment which mange the change among components by time and situation. In addition, each components are defined and use ANP technique for best decision-making by using the subordinate relationship and feedback considering the mutual dependency referring the change of components in distributed environment. Thus, we analyze the dependency among each components and show 3 types of change relationship. Also through analysis of dependency, we verified the effectiveness of such approach.

Design of a Gateway in the Reference Model for Integrated Emergency Alerting System (통합 경보 시스템을 위한 참조 모델 게이트웨이 설계)

  • Jin, Dain;Lee, Jaeho;Choi, Seong Jong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2015.07a
    • /
    • pp.165-166
    • /
    • 2015
  • 사회 규모와 인구의 급속한 증가에 따라, 다양한 재난으로 인한 인명과 재산의 피해가 증가하고 있는 추세이다. 이에 따라 재난으로 인한 인명과 재산의 피해를 최소화하기 위한 표준화되고 안정적인 재난 관리 체계의 중요성 또한 높아지고 있다. 본 논문에서는 이러한 통합 경보 시스템을 구축하는 데 기초가 되기 위한 통합 경보 시스템 참조 모델의 개괄적인 구조, 그리고 이들을 구성하는 각각의 컴포넌트 중, 다양한 이기종 경보 발령 시스템과 표준 경보 발령대 간의 통신을 담당하는 게이트웨이의 설계에 있어 필요한 시스템 요구사항과 설계안을 제시한다.

  • PDF

A USE CASE based Test Model for CBD Based Software (CBD 기반 소프트웨어에 대한 유스케이스 기반 테스트모델)

  • 유지호;이남용
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.4
    • /
    • pp.239-252
    • /
    • 2003
  • High quality software is the one that has an excellent performance with a low price, consumer's request satisfaction and less bug. In addition, it should have structure easily maintainable. CBD(Component Based Development)technology is getting more popular as a method for software development which can satisfy all above conditions. Although there are a lot of test methods about component for composition, function, compatibility and reliability, it's not enough to ensure that the component has reliability, maintainability, and reusability, so an integated method are necessary. In this paper, we are going to propose the solution model for integrating components, which are based on UML (Unified Modeling Language) technologies. This model can extract existing faults in the component interfaces by referencing sequence diagram and collaboration diagram.

  • PDF

Extended Use Case Modeling for Service-Oriented Computing (서비스 지향 컴퓨팅을 위한 확장 유스케이스 모델링)

  • Cho, Jun-Soo;Chong, Ki-Won
    • Journal of Internet Computing and Services
    • /
    • v.10 no.5
    • /
    • pp.153-163
    • /
    • 2009
  • It is necessary to identify the use cases of the supplier systems in order to define new service using their functions. Current use case modeling techniques, however, do not represent the external use cases clearly, because the external system is represented only by an actor. This ambiguity of the modeling technique declines the comprehensiveness of the model, and does not limit the scope of the target system explicitly. In this paper, we propose the extended use case modeling technique for service-oriented computing. This modeling technique enables the definition of external use cases and components. They are used to limit the boundary of the target system, and the relationship between them are modeled by the realization of external use cases. The proposed technique uses UML stereotype extension mechanism. so the compatibility with current use case modeling technique is preserved.

  • PDF

A Study on Object Security Service in Object- Oriented Distributed Environment (객체지향 분산환경에서 객체보안 서비스에 관한 연구)

  • Song, Gi-Beom;Lee, Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.699-702
    • /
    • 2002
  • 분산 객체 컴퓨팅은 인터넷의 활성화와 더불어 각광받고 있는 분야중의 하나이며 많은 응용 소프트웨어들이 분산객체 기술을 이용한 컴포넌트 형태로 개발되고 있다. 분산 객체 컴퓨팅 기술을 기반으로 한 CORBA는 새로운 세대의 분산 컴퓨팅 플랫폼이며, 보안은 항상 분산 컴퓨팅 플랫폼의 기본적인 문제이다. 따라서, CORBA 플랫폼에서의 보안 서비스의 적용은 매우 중요하다. 본 논문에서는 보안의 표준들과 분산 계산 플랫폼의 보안 모델들을 참조하여 CORBA 보안 서비스 규약에 따르는 객체지향 분산환경에서의 객체보안 서비스를 제시한다.

  • PDF