• 제목/요약/키워드: Software engineering issues

검색결과 350건 처리시간 0.035초

A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions

  • Kim, Nam Yong;Rathore, Shailendra;Ryu, Jung Hyun;Park, Jin Ho;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제14권6호
    • /
    • pp.1361-1384
    • /
    • 2018
  • Recently, Cyber Physical System (CPS) is one of the core technologies for realizing Internet of Things (IoT). The CPS is a new paradigm that seeks to converge the physical and cyber worlds in which we live. However, the CPS suffers from certain CPS issues that could directly threaten our lives, while the CPS environment, including its various layers, is related to on-the-spot threats, making it necessary to study CPS security. Therefore, a survey-based in-depth understanding of the vulnerabilities, threats, and attacks is required of CPS security and privacy for IoT. In this paper, we analyze security issues, threats, and solutions for IoT-CPS, and evaluate the existing researches. The CPS raises a number challenges through current security markets and security issues. The study also addresses the CPS vulnerabilities and attacks and derives challenges. Finally, we recommend solutions for each system of CPS security threats, and discuss ways of resolving potential future issues.

A Modular Decomposition Model for Software Project Scheduling

  • Kim, Kiseog;Nag, Barin N.
    • 한국경영과학회지
    • /
    • 제18권3호
    • /
    • pp.129-149
    • /
    • 1993
  • The high level of activity in the development and maintenance of computer software makes the scheduling of software projects an importnat factor in reducing operating costs and increasing competitiveness. Software activity is labor intensive. Scheduling management of hours of software work is complicated by ther interdependencies between the segments of work, and the uncertainties of the work itself. This paper discusses issues of scheduling in software engineering management, and presents a modular decomposition model for software project scheduling, taking advantage of the facility for decomposition of a software project into relatively independent work segment modules. Modular decomposition makes it possible to treat scheduling as clustering and sequencing in the context of integer programming. A heuristic algorithm for the model is presented with some computational experiments.

  • PDF

An Overview of Time Estimation in the Appraisal of Completeness for Software

  • Kim, Yukyong
    • 한국소프트웨어감정평가학회 논문지
    • /
    • 제16권1호
    • /
    • pp.21-26
    • /
    • 2020
  • The completeness appraisal of software is performed in various forms, such as assessing the completion level in the development process, calculating the defect rate, estimating the development cost, and calculating the redevelopment cost. Along with this, the problem that is often dealt with is estimation of the development time. Even in a dispute over completeness due to delays in software development, issues of calculating an appropriate development time required to develop a delivery software or a development time required for change requests are often included in the appraisal request. In this paper, we introduce the procedure and method for estimating the appropriate project time of software development so that the appraiser can be applied to the appraisal work for determining the completeness. The method is based on the manual for calculating the appropriate project period of software development project.

Difficulties in ERP integration in Umm Al Qura University: A Case Study

  • Abdullah A H Alzahrani
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.35-43
    • /
    • 2024
  • The development and integration of Enterprise Resource Planning (ERP) systems have consistently attracted attention from software engineering researchers. Many studies have examined the factors that influence successful ERP integration, while others have focused on introducing integration models that address issues and challenges that affect the successful integration of ERP. However, it is crucial to recognize that the key player in successful integration is the individual involved. This paper aims to investigate how individuals based on departmental attachments and experiences have viewed the factors that affected the success of ERP integration. A case study was conducted at one large organization namely Umm Al Qura University, Saudi Arabia. Five departments were involved namely: Financial management, purchasing management, warehouse management, human resources management, and the Deanship of Information Technology. The results of 78 participants were collected and analyzed. Furthermore, it was different how individuals from different departments involved in the ERP integration viewed the factors that affected the success of integration. In addition, it was noticed that individuals with different experiences have various views on the factors. Moreover, it was evident that departmental attachments and individual experience might play a role in the successful integration of ERP.

Agile Networking in Smart Grids

  • Qin, Zhenquan;Zhang, Jianing;Shi, Liang;Wang, Lei;Shu, Lei;Guo, Yuquan
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제1권1호
    • /
    • pp.34-49
    • /
    • 2012
  • Recently, the smart grid (SG) has been introduced to solve the serious network issues caused by the increasing electrical demand and the complex nonlinear nature of the electric power distribution network. The SG, regarded as the next generation power grid, can transmit power in more efficient ways by building an automatic and distributed energy delivery network. In this paper, we first assess how various existing networking technologies, such as IEEE 802.11 (WiFi) and IEEE 802.15.4 (ZigBee), meet the requirements of the SG communication protocols. Specifically, we classify the existing network protocols into three categories: WSN-based networking, WiFi-based networking, and wireline-based networking. We then survey the security issues regarding the SG. Finally, we propose an agile SG networking architecture and show the effectiveness of different adopted networking technologies and, as a result, present a candidate solution to implement agile networking in SGs.

  • PDF

Exploring Pseudonymous based Schemes for Safegaurding Location Privacy in Vehicular Adhoc Network (VANET)

  • Arslan Akhtar Joyo;Fizza Abbas Alvi;Rafia Naz Memon;Irfana Memon;Sajida Parveen
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.101-110
    • /
    • 2023
  • Vehicular Ad Hoc Network (VANET) is considered to be a subclass of Mobile Ad Hoc Networks (MANET). It has some challenges and issues of privacy which require to be solved before practical implementation of the system i.e., location preservation privacy. Many schemes have been proposed. The most prominent is pseudonym change based location preservation scheme. Safety message can be compromised when it sends via a wireless medium, consequently, an adversary can eavesdrop the communication to analyze and track targeted vehicle. The issue can be counter by use of pseudo identity instead of real and their change while communication proves to be a sufficient solution for such problems. In this context, a large amount of literature on pseudonym change strategies has been proposed to solve such problems in VANET. In this paper, we have given details on strategies proposed last two decades on pseudonym change based location preservation along with issues that they focus to resolve and try to give full understanding to readers.

A Systematic Treat Model for Software-Defined Networking

  • Zhang, Wenbin;Wu, Zehui;Wei, Qiang;Yuan, Huijie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권2호
    • /
    • pp.580-599
    • /
    • 2021
  • Software-Defined Networking (SDN) has three key features: separation of control and forwarding, centralized control, and network programmability. While improving network management flexibility, SDN has many security issues. This paper systemizes the security threats of SDN using spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege (STRIDE) model to understand the current security status of SDN. First, we introduce the network architecture and data flow of SDN. Second, we analyze security threats of the six types given in the STRIDE model, aiming to reveal the vulnerability mechanisms and assess the attack surface. Then, we briefly describe the corresponding defense technologies. Finally, we summarize the work of this paper and discuss the trends of SDN security research.

數理計劃 소프트웨어 LinPro의 설계 및 구현 (Design and Implementation of Mathematical Programming Software-LinPro)

  • 양광민
    • 한국경영과학회지
    • /
    • 제12권1호
    • /
    • pp.139-139
    • /
    • 1987
  • This study addresses basic requirements for mathematical programming software, discusses considerations in designing these software, implementation issues facing in these types of applications development, and shows some examples of codes being developed in the course. This type of projects requires long and ever-changing evolutionary phases. The experience is therefore, valuaable in suggesting some useful hints which may be salvaged for similar projects as well as providing reusable codes. In particular, scanning and parsing the free-format inputs, symbol table management, mixed-language programming, and data structures dealing with large sparse matrices are indispensable to many management science software development. Extensions to be made are also discussed.

분산 컴포넌트 기반의 소프트웨어 분석 및 설계 방법 (An Approach to Software Analysis and Design based on Distributed Components)

  • 최유희;염근혁
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제28권12호
    • /
    • pp.896-909
    • /
    • 2001
  • 현재 새롭게 개발되는 소프트웨어는 50% 이상이 분산 플랫폼에서 개발되고 있다. 또한 분산 컴포넌트 기반의 소프트웨어 개발을 가능하게 하는 EJB(Enterprise Java Beans)[1] COM(Component Object Model )[2]. CORBA(Common Object Request Broker Architecture)[3] 와 같은 기술이 급격히 발전하고 있다. 따라서 분산 플랫폼 상에서 컴포넌트 기반의 응용 소프트웨어 개발을 위한 체계적인 개발 프로세스가 요구된다. 그러나 현재의 일반적인 컴포넌트 기반 소프트웨어 개발 방법론은 각 작업들간의 관 계와 각 작업의 산출물간의 관계를 명확히 제시하지 않는다. 또한 분산 응용 소프트웨어 개발에 있어서 고려되어야 할 분산 이슈에 대해서도 체계적으로 다루지 않고 있다. 본 논문에서는 분산 컴포넌트 기반의 응용 소프트웨어 개발을 위한 분석 및 설계 방법을 제시한다. 본 논문에서 제시하는 방법에서는 UMI 기반의 프로세스인 Unified process를 바탕으로 하여 체계적인 개발 지침과 산출물의 관계를 제시한다 또한 플랫폼과 프로그래밍 언어에 독립적인 CORBA 환경을 고려하여 성능. 결함 방지, 안전성, 분산 트랜잭션의 분산 이슈를 명시적으로 다루는 지침을 제시한다.

  • PDF

오픈 소스 라이선스 양립성 위반 식별 기법 연구 (A Study on the Identification of Open Source License Compatibility Violations)

  • 이동건;서영석
    • 정보처리학회논문지:소프트웨어 및 데이터공학
    • /
    • 제7권12호
    • /
    • pp.451-460
    • /
    • 2018
  • 전 세계적으로 각종 산업 분야를 불문하고 소프트웨어 개발 시 오픈 소스 소프트웨어가 다양하게 활용되고 있다. 이러한 오픈 소스 소프트웨어는 자유로운 사용에 대한 권리뿐만 아니라 그에 따른 책임을 라이선스(license) 형태로 요구한다. 오픈 소스 소프트웨어 라이선스는 오픈 소스 소프트웨어 개발자와 이용자 간의 조건 범위를 명시한 계약이기 때문에 개발자가 규정한 라이선스를 지켜야 하며 이를 위반할 경우에는 저작권 침해가 발생하고, 이에 대한 책임을 지게 된다. 특히, 새로운 소프트웨어 개발 시 기존에 개발된 오픈 소스 소프트웨어를 활용하는 경우, 각 코드의 라이선스가 양립성(compatibility)문제를 발생시키지 않고 서로 호환되는지 확인해야만 한다. 그러나 이러한 철학에 반하여 양립성 문제 관련 사건들이 다수 발생하고 소송으로 이어지기도 하면서 원활한 오픈 소스 소프트웨어 생태계에 악영향을 미치고 있다. 따라서 본 논문에서는 사용하고자 하는 오픈 소스 소프트웨어들 간에 오픈 소스 규칙을 준수하고 라이선스 양립성 문제가 발생하지 않는지 식별할 수 있는 새로운 기법인 OSLC-Vid를 제안한다. 이렇게 제안된 기법은 실제 오픈 소스 소프트웨어를 활용하여 위반사례 식별 성능을 검증하였다.