• Title/Summary/Keyword: Software Assets

Search Result 126, Processing Time 0.024 seconds

A Technical Assessment of Software Product Line Methodologies (소프트웨어 제품 계열 방법론의 기술적 평가)

  • Park Shin-Young;Kim Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.51-60
    • /
    • 2006
  • Product Line Engineering(PLE) is an effective software development technique which produces applications using core assets. Because of reusing the core assets, PLE can save cost for developing products in a domain but increase reusability. There are about ten PLE methodologies available, but there are not yet common agreements on PLE process and artifacts. This makes developers harder to choose a methodology and to apply it in practice. A comprehensive technical evaluation and comparison on existing PLE methodologies would be essential for practitioners. In this paper, we present a technical assessment of representative PLE methodologies; FAST, SEI SPL, PuLSE, Bosch's PL proceis, FOPLE, ESAPS, KobrA/PoLITe, Alexandria, COPA, QADA. They are compared in the criteria of process, artifacts, instructions, and special features. And we identify common or variable elements between methodologies and confirm elements to be improved in each PLE methodology. The assessment result would be well utilized in defining a practical methodology for PLE projects and in choosing an appropriate methodology among available ones.

A Metric-based Methodfor Evaluating Product Line Architecture (프로덕트라인 아키텍처의 정량성 평가 기법)

  • Chang Soo-Ho;La Hyun-Jung;Kim Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.5
    • /
    • pp.449-459
    • /
    • 2006
  • Product Line Engineering (PLE) has been widely accepted as a representative software reuse methodology by using core assets. As a key element of core assets, product line architecture (PLA) should be generic to a set of applications in the product line (PL). However, the difference between PLA and single system architecture has not been treated well enough, so evaluating PLA still remains as one of the difficult tasks in PLE. In this paper, we identify two intrinsic but overlooked issues in PLA; variability propagation chain and conflicts between architectural elements. And, we present a metric-based methodto evaluate PLA from the perspective of the two issues. We believe that the two issues in PLA and the evaluation method would make designing high-quality PLA more feasible and effective.

A Business System Analysis Model with Extended Entity Concept (확장된 개체 개념의 비즈니스 시스템 분석 모델)

  • Lee, Seo-Jeong;Ko, Byung-Sun;Choi, Mi-Sook;Park, Jai-Nyun
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.12
    • /
    • pp.885-895
    • /
    • 2001
  • Existing system analysis models suggest various ideas to present entity relations and event flows for consistency between analysis and design paradigms. However, they are preferred to derive and arrange related entities on system flow than to identify entities. To identify entities systematically is a basic and important work of software development, and identified entities can be major assets of business system. In case of business systems the business rules or the computed or derived information like attendance lists of lecture system can be the most important system assets. The management information or meta data are also. In this paper, we suggest a business system analysis models to derive and present entities. System is identified entities, interfaces and event or behaviors through this model then entities are extended to independent entities, dependent entities, which are dependent to independent entities, constraint shows the physical and administrative notices. Various entity identification can reduce the incompleteness of entity analysis.

  • PDF

A Practical Reference Model of Component Frameworks (컴포넌트 프레임웍의 실용적 참조 모델)

  • Her Jin-Sun;Kim Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.6
    • /
    • pp.525-538
    • /
    • 2006
  • Component-Based Software Engineering (CBSE) is widely accepted as new paradigms for building applications with reusable assets. Mismatch problems occur while integrating the assets and make a burden in CBSE. Therefore, a larger-grained reuse unit than a component such as a framework is required, and it consists of relevant components, connectors and domain-specific architecture. The benefits of frameworks over components are commonly known, however, the key elements and internal structure of framework has not been clearly defined. We believe most of the framework models proposed in recent works remain at conceptual level. In this paper, we propose a practical-level framework reference model, and define key elements of frameworks. The research goal is to precisely identify concrete elements of a framework, inter-connection of components within a framework, extended notion of connectors, and tailored meaning of architecture In a framework. Hence, the proposed framework can be practically implemented in common object-oriented languages and with middleware such as lava, J2EE, CORBA Component Model (CCM) and NET.

360 Content Pilot Service Platform of Cultural Assets Based on MPEG-V Standard Realistic Media Testbed (MPEG-V 표준 실감미디어 테스트베드에 기반을 둔 문화재 360 콘텐츠 시범 서비스 플랫폼)

  • Shim, Tae-soeb;Yoo, Soo-bin;Shin, Sang-ho
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.6
    • /
    • pp.666-673
    • /
    • 2017
  • In this paper, we propose a 360 content pilot service platform of cultural assets based on MPEG-V standard realistic media testbed. MPEG-V is that the standard format of sensory effect metadata(SEM) such like wind, light and flash, and communication protocol between sensory effect machines are defined, and it is possible to increase the sense of presence and immersion with 360 VR content. The proposed platform consists of software which is composed of the content player and the sensory effect reappearance server, and hardware which is the sensory effect machines. Also, the pilot service case using the proposed platform, and the features and advantages of the proposed platform are described.

Study on Automation of Comprehensive IT Asset Management (포괄적 IT 자산관리의 자동화에 관한 연구)

  • Wonseop Hwang;Daihwan Min;Junghwan Kim;Hanjin Lee
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • The IT environment is changing due to the acceleration of digital transformation in enterprises and organizations. This expansion of the digital space makes centralized cybersecurity controls more difficult. For this reason, cyberattacks are increasing in frequency and severity and are becoming more sophisticated, such as ransomware and digital supply chain attacks. Even in large organizations with numerous security personnel and systems, security incidents continue to occur due to unmanaged and unknown threats and vulnerabilities to IT assets. It's time to move beyond the current focus on detecting and responding to security threats to managing the full range of cyber risks. This requires the implementation of asset Inventory for comprehensive management by collecting and integrating all IT assets of the enterprise and organization in a wide range. IT Asset Management(ITAM) systems exist to identify and manage various assets from a financial and administrative perspective. However, the asset information managed in this way is not complete, and there are problems with duplication of data. Also, it is insufficient to update of data-set, including Network Infrastructure, Active Directory, Virtualization Management, and Cloud Platforms. In this study, we, the researcher group propose a new framework for automated 'Comprehensive IT Asset Management(CITAM)' required for security operations by designing a process to automatically collect asset data-set. Such as the Hostname, IP, MAC address, Serial, OS, installed software information, last seen time, those are already distributed and stored in operating IT security systems. CITAM framwork could classify them into unique device units through analysis processes in term of aggregation, normalization, deduplication, validation, and integration.

Legacy System-Based Software Product Line Engineering: A Case Study on Cable Set-Top Box Software (기존 시스템 기반의 소프트웨어 제품라인 공학기법: 케이블 셋톱박스 소프트웨어 사례)

  • Choi, Hyun-Sik;Lee, Hye-Sun;Cho, Yoon-Ho;Kang, Kyo-Chul
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.7
    • /
    • pp.539-547
    • /
    • 2009
  • Software product line (SPL) engineering is an emerging paradigm for successful software reuse and has been adopted for various industrial and consumer products to improve their productivity and quality. However, most SPL methods require high initial costs and long development time, which makes many companies hesitate to adopt the SPL paradigm. In this paper we introduce a method to construct an SPL by extracting core assets from legacy components based on the feature model, which requires less initial time and effort. We also present a case study on cable set-top box software to illustrate the applicability of this method, and lessons learned that will provide guidelines for many companies to adopt the SPL paradigm.

Audit Expectation Gap: Empirical Evidence from Vietnam

  • NGUYEN, Hieu Thanh;NGUYEN, Anh Huu
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.5
    • /
    • pp.51-60
    • /
    • 2020
  • The paper examines the characteristics and causes of the expectation gap of audit and assurance services. The paper has conducted three surveys with three target groups. In the first survey, participants are auditors, users of audit reports are subject in the second survey and in the third survey, and students major in auditing are selected. The content of the survey aims to find out the differences in perception of the survey participants on two issues: (i) responsibilities of auditors for detection frauds, errors, protection of the enterprise's assets and financial scandals, and (ii) the role of audit and auditors in making investment decisions and investor's belief. The research carried out survey from March to September 2019 with 165 responds. The collected data was processed by statistical software SPSS, version 23, and Mann-Whitney U test was used to analyze the results of the audit expectation gap between the auditor group and the users of audit report group and between the student group and users of audit report group. The results showed that there exists an expectation gap in the responsibility of auditors for detection of all frauds, errors and protection enterprise's assets. Recommendations include strengthening audit standards, penalizing bad practices and ensuring auditor's independence.

Survey on the use of security metrics on attack graph

  • Lee, Gyung-Min;Kim, Huy-Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.95-105
    • /
    • 2018
  • As the IT industry developed, the information held by the company soon became a corporate asset. As this information has value as an asset, the number and scale of various cyber attacks which targeting enterprises and institutions is increasing day by day. Therefore, research are being carried out to protect the assets from cyber attacks by using the attack graph to identify the possibility and risk of various attacks in advance and prepare countermeasures against the attacks. In the attack graph, security metric is used as a measure for determining the importance of each asset or the risk of an attack. This is a key element of the attack graph used as a criterion for determining which assets should be protected first or which attack path should be removed first. In this survey, we research trends of various security metrics used in attack graphs and classify the research according to application viewpoints, use of CVSS(Common Vulnerability Scoring System), and detail metrics. Furthermore, we discussed how to graft the latest security technologies, such as MTD(Moving Target Defense) or SDN(Software Defined Network), onto the attack graphs.

Impacts of Capital Structure on Business Efficiency of Listed Joint Stock Commercial Banks in Vietnam Stock Market

  • DOAN, Quyen Thuc;HO, Thu Thi Hoai;DOAN, Quynh Huong
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.8
    • /
    • pp.99-108
    • /
    • 2022
  • This study aims to examine the influence of capital structure on the business efficiency of joint stock commercial banks listed on the Vietnamese stock market. The article uses data collected from the financial statements of 15 prominent joint-stock commercial banks out of 27 joint-stock commercial banks listed in Vietnam from 2011 to 2021. The research uses E-view software in quantitative analysis to build regression models to determine the relationship and the impact of capital structure factors on the business efficiency of listed joint stock commercial banks. Research results show that ROA is affected by 2 variables of capital structure. It is the sum of customer deposits to total assets and total liabilities to total equity. Total debt to total equity and total customer deposits to total assets both have a negative effect on ROA. For the regression results of ROA with all control variables, the control variables have a positive relationship with the dependent variable. The article has provided recommendations based on the research findings to determine the proper capital structure. Managers must solve the outstanding amount of mobilized capital in previous years, combined with the bad debt handling activities that have arisen.