首页 > 最新文献

2011 IEEE International Systems Conference最新文献

英文 中文
Group identity in social and cultural systems 社会和文化系统中的群体认同
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929102
Brian Moriarty
The research in this paper analyzes the common characteristics shared between social organizations of varied type and how personal and group identity within these groups is derived from the identification with common contextual artifacts. This analysis is performed through survey questions concerning markers of cultural identity posed to the Armenian Diaspora, a relatively small, geographically disparate, cultural group. Due to geographic dispersion, this group serves as a useful representative for illustrating common artifacts as well as divergences in markers of personal identity. Social systems are composed of an agglomeration of groups of this type, cultural and social, that are central in the formation of personal identity within a larger societal context. Groups identify themselves through self-imposed artifacts or by artifacts imposed by virtue of their identification within a given social or cultural group. These markers of identity sometimes serve as a unifying principle within varied social structures, but often serve a different purpose, as a dividing principal within organizations as well as cultural groups. The conflict resulting from this type of interaction serves as an impediment to organizational efficiency. Integration in corporate structures and similarly interorganizational attempts to broker coexistence between cultural groups sharing common geography or other binding characteristics are commonly challenged by issues of object identity resulting in strife derived from identification of cultural artifacts.
本文分析了不同类型的社会组织之间的共同特征,以及这些群体中的个人和群体身份是如何从对共同情境人工制品的认同中衍生出来的。这一分析是通过对亚美尼亚侨民(一个相对较小的、地理上不同的文化群体)提出的有关文化认同标志的调查问题进行的。由于地理上的分散,这个群体可以作为一个有用的代表来说明共同的人工制品以及个人身份标记的分歧。社会系统是由这种类型的文化和社会群体的聚集组成的,这是在更大的社会背景下形成个人身份的核心。群体通过自己强加的人工制品或在给定的社会或文化群体中由于他们的身份而强加的人工制品来识别自己。这些身份标志有时在不同的社会结构中作为统一的原则,但往往有不同的目的,在组织和文化群体中作为分裂的原则。这种类型的互动所产生的冲突会阻碍组织效率。公司结构的整合和类似的组织间尝试在共享共同地理或其他约束性特征的文化群体之间调解共存,通常受到客体身份问题的挑战,从而导致文化文物身份的冲突。
{"title":"Group identity in social and cultural systems","authors":"Brian Moriarty","doi":"10.1109/SYSCON.2011.5929102","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929102","url":null,"abstract":"The research in this paper analyzes the common characteristics shared between social organizations of varied type and how personal and group identity within these groups is derived from the identification with common contextual artifacts. This analysis is performed through survey questions concerning markers of cultural identity posed to the Armenian Diaspora, a relatively small, geographically disparate, cultural group. Due to geographic dispersion, this group serves as a useful representative for illustrating common artifacts as well as divergences in markers of personal identity. Social systems are composed of an agglomeration of groups of this type, cultural and social, that are central in the formation of personal identity within a larger societal context. Groups identify themselves through self-imposed artifacts or by artifacts imposed by virtue of their identification within a given social or cultural group. These markers of identity sometimes serve as a unifying principle within varied social structures, but often serve a different purpose, as a dividing principal within organizations as well as cultural groups. The conflict resulting from this type of interaction serves as an impediment to organizational efficiency. Integration in corporate structures and similarly interorganizational attempts to broker coexistence between cultural groups sharing common geography or other binding characteristics are commonly challenged by issues of object identity resulting in strife derived from identification of cultural artifacts.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126555874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computing the impact of cyber attacks on complex missions 计算网络攻击对复杂任务的影响
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929055
S. Musman, Mike Tanner, A. Temin, E. Elsaesser, Lewis Loren
This paper describes how to evaluate the impact of a cyber attack on a mission. We accomplish this by computing impact as the changes to mission measures of effectiveness, based on the reported effects of a known or suspected attack on one or more parts of the information technology (IT) supporting the mission. Our previous papers have described our goals for computing mission impact and the choices of the techniques we use for modeling missions, IT, and cyber attacks. This paper focuses on how we compute the impact of cyber attacks on IT processes and information. These computations will improve decision-making when under cyber attack by providing accurate and detailed assessments of the impact of those attacks. Although the focus of our work has been on the calculation of cyber mission impacts during mission execution, we have also demonstrated how our representations and computations can be used for performing cyber risk analysis and crown jewels analysis.
本文描述了如何评估网络攻击对任务的影响。我们根据对支持任务的信息技术(IT)的一个或多个部分的已知或可疑攻击所报告的影响,通过计算影响作为任务有效性度量的变化来实现这一点。我们之前的论文描述了我们计算任务影响的目标,以及我们用于任务建模、IT和网络攻击的技术选择。本文的重点是我们如何计算网络攻击对IT流程和信息的影响。这些计算将提供对这些攻击影响的准确和详细的评估,从而在遭受网络攻击时改善决策。虽然我们的工作重点是在任务执行期间计算网络任务影响,但我们也展示了如何将我们的表示和计算用于执行网络风险分析和皇冠珠宝分析。
{"title":"Computing the impact of cyber attacks on complex missions","authors":"S. Musman, Mike Tanner, A. Temin, E. Elsaesser, Lewis Loren","doi":"10.1109/SYSCON.2011.5929055","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929055","url":null,"abstract":"This paper describes how to evaluate the impact of a cyber attack on a mission. We accomplish this by computing impact as the changes to mission measures of effectiveness, based on the reported effects of a known or suspected attack on one or more parts of the information technology (IT) supporting the mission. Our previous papers have described our goals for computing mission impact and the choices of the techniques we use for modeling missions, IT, and cyber attacks. This paper focuses on how we compute the impact of cyber attacks on IT processes and information. These computations will improve decision-making when under cyber attack by providing accurate and detailed assessments of the impact of those attacks. Although the focus of our work has been on the calculation of cyber mission impacts during mission execution, we have also demonstrated how our representations and computations can be used for performing cyber risk analysis and crown jewels analysis.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125252202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
A risk modelling approach for a Communicating System of Systems 系统的通信系统的风险建模方法
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929099
J. Aitken, R. Alexander, T. Kelly
Communicating Systems of Systems provide new methods for developing flexibility and functionality. However, these systems contain added layers of complexity due to the emergent behaviours present in the network. In order to understand the safety implications of operating these SoS this paper develops a new risk modelling technique. Building on information contained within the MODAF model of the SoS this technique provides a structure to enable the analysis of risk.
系统的通信系统为开发灵活性和功能提供了新的方法。然而,由于网络中出现的突发行为,这些系统包含了额外的复杂性层。为了了解操作这些SoS的安全含义,本文开发了一种新的风险建模技术。在SoS的MODAF模型中包含的信息的基础上,这种技术提供了一种能够分析风险的结构。
{"title":"A risk modelling approach for a Communicating System of Systems","authors":"J. Aitken, R. Alexander, T. Kelly","doi":"10.1109/SYSCON.2011.5929099","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929099","url":null,"abstract":"Communicating Systems of Systems provide new methods for developing flexibility and functionality. However, these systems contain added layers of complexity due to the emergent behaviours present in the network. In order to understand the safety implications of operating these SoS this paper develops a new risk modelling technique. Building on information contained within the MODAF model of the SoS this technique provides a structure to enable the analysis of risk.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134375160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
System architecture pliability and trading operations in tradespace exploration 贸易空间探索中的系统架构灵活性与交易操作
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929073
Brian Mekdeci, A. Ross, D. Rhodes, D. Hastings
The concept of operations is often assumed when assessing different design variables in a tradespace study for a particular system architecture, The way a system operates, however, has a large effect on its performance, and can often be the only variable through which stakeholders can influence a system after the system is implemented. The concept of pliable system architectures is introduced so that operational variables can be explicitly considered and incorporated into tradespace studies. System transitions can be predicted by pliability, and these transitions can provide insight into other system “ilities” such as changeability, adaptability, flexibility and survivability. Two techniques are introduced in order to demonstrate the usefulness of the pliability concept; (1) a step-by-step process by which operational variables can be identified within a system architecture, and (2) a process by which very large tradespaces can be sampled into a manageable set of system instances that provide maximum insight for the level of effort to model them. As these new concepts and methodologies are new and part of ongoing research, they will need to be tested and validated in future work.
在对特定系统架构的贸易空间研究中评估不同的设计变量时,通常假设操作的概念。然而,系统运行的方式对其性能有很大的影响,并且通常是利益相关者在系统实现后可以影响系统的唯一变量。引入了柔性系统架构的概念,以便可以明确地考虑操作变量并将其纳入贸易空间研究。系统转换可以通过柔韧性来预测,并且这些转换可以提供对其他系统“功能”的洞察,例如可变性、适应性、灵活性和生存性。介绍了两种技术,以证明柔韧性概念的有用性;(1)一步一步的过程,通过这个过程,操作变量可以在系统架构中被识别,(2)一个过程,通过这个过程,非常大的交易空间可以被抽样到一组可管理的系统实例中,这些实例可以为建模它们的努力程度提供最大的洞察力。由于这些新概念和方法是新的,并且是正在进行的研究的一部分,因此需要在未来的工作中对它们进行测试和验证。
{"title":"System architecture pliability and trading operations in tradespace exploration","authors":"Brian Mekdeci, A. Ross, D. Rhodes, D. Hastings","doi":"10.1109/SYSCON.2011.5929073","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929073","url":null,"abstract":"The concept of operations is often assumed when assessing different design variables in a tradespace study for a particular system architecture, The way a system operates, however, has a large effect on its performance, and can often be the only variable through which stakeholders can influence a system after the system is implemented. The concept of pliable system architectures is introduced so that operational variables can be explicitly considered and incorporated into tradespace studies. System transitions can be predicted by pliability, and these transitions can provide insight into other system “ilities” such as changeability, adaptability, flexibility and survivability. Two techniques are introduced in order to demonstrate the usefulness of the pliability concept; (1) a step-by-step process by which operational variables can be identified within a system architecture, and (2) a process by which very large tradespaces can be sampled into a manageable set of system instances that provide maximum insight for the level of effort to model them. As these new concepts and methodologies are new and part of ongoing research, they will need to be tested and validated in future work.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115877563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Optimization and control of hydrogen and energy flows in a Green Hydrogen Refuelling Stations 绿色加氢站氢气和能量流动的优化与控制
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929057
H. Dagdougui, A. Ouammi, R. Sacile
In this paper, an optimization model of Green Hydrogen Refuelling Station (GHRS) is presented. The GHRS is powered completely by a wind farm to satisfy predefined hydrogen fuel and electrical energy demands. The model based on a mathematical programming is developed to control both energy and hydrogen flows exchanged among the system components. The optimization model has been applied on one week basis to a case study in the province of Savona, Italy. Optimal results are reported taking into account the presence of an additional hydrogen industrial market and a connection with the electrical network.
本文建立了绿色加氢站的优化模型。GHRS完全由风力发电场提供动力,以满足预定的氢燃料和电能需求。建立了基于数学规划的模型来控制系统组件之间交换的能量流和氢流。该优化模型已应用于意大利萨沃纳省的一个为期一周的案例研究。考虑到额外的氢工业市场的存在和与电网的连接,报告了最佳结果。
{"title":"Optimization and control of hydrogen and energy flows in a Green Hydrogen Refuelling Stations","authors":"H. Dagdougui, A. Ouammi, R. Sacile","doi":"10.1109/SYSCON.2011.5929057","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929057","url":null,"abstract":"In this paper, an optimization model of Green Hydrogen Refuelling Station (GHRS) is presented. The GHRS is powered completely by a wind farm to satisfy predefined hydrogen fuel and electrical energy demands. The model based on a mathematical programming is developed to control both energy and hydrogen flows exchanged among the system components. The optimization model has been applied on one week basis to a case study in the province of Savona, Italy. Optimal results are reported taking into account the presence of an additional hydrogen industrial market and a connection with the electrical network.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116388199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web services for handheld tactical systems 手持式战术系统的Web服务
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929101
Soumya Simanta, Daniel Plakosh, E. Morris
Service-Oriented Architecture (SOA) is an architectural pattern for constructing and deploying systems characterized by components called services that can be composed into applications using standard interface formats. While service orientation can reduce integration cost and enhance agility in response to changing situations, it has not been widely applied to support mobile users in ad hoc, wireless computing environments common to tactical military situations and first responders to humanitarian disasters. These environments are impoverished in terms of computational resources and network characteristics. This paper describes a set of prototypes that demonstrate the use of SOA in tactical environments in which users are employing handheld devices to obtain situational awareness data.
面向服务的体系结构(SOA)是一种体系结构模式,用于构造和部署以称为服务的组件为特征的系统,这些组件可以使用标准接口格式组合成应用程序。虽然面向服务可以降低集成成本并增强响应变化情况的敏捷性,但它尚未广泛应用于支持战术军事情况和人道主义灾难的第一响应者常见的临时无线计算环境中的移动用户。这些环境在计算资源和网络特性方面是贫乏的。本文描述了一组原型,这些原型演示了SOA在战术环境中的使用,在战术环境中,用户使用手持设备获取态势感知数据。
{"title":"Web services for handheld tactical systems","authors":"Soumya Simanta, Daniel Plakosh, E. Morris","doi":"10.1109/SYSCON.2011.5929101","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929101","url":null,"abstract":"Service-Oriented Architecture (SOA) is an architectural pattern for constructing and deploying systems characterized by components called services that can be composed into applications using standard interface formats. While service orientation can reduce integration cost and enhance agility in response to changing situations, it has not been widely applied to support mobile users in ad hoc, wireless computing environments common to tactical military situations and first responders to humanitarian disasters. These environments are impoverished in terms of computational resources and network characteristics. This paper describes a set of prototypes that demonstrate the use of SOA in tactical environments in which users are employing handheld devices to obtain situational awareness data.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116900569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Supply chain risk management - Understanding vulnerabilities in code you buy, build, or integrate 供应链风险管理——了解您购买、构建或集成的代码中的漏洞
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929123
P. Croll
This paper describes the scope of the problem regarding software vulnerabilities and the current state of the practice in static code analysis for software assurance. Recommendations are made regarding the use of static analysis methods and tools during the software life. Static code analysis touch points in during life cycle reviews and challenges to automated static code analysis are also discussed.
本文描述了软件漏洞问题的范围和软件保障静态代码分析实践的现状。建议在软件生命周期中使用静态分析方法和工具。本文还讨论了生命周期评审中的静态代码分析接触点以及自动化静态代码分析面临的挑战。
{"title":"Supply chain risk management - Understanding vulnerabilities in code you buy, build, or integrate","authors":"P. Croll","doi":"10.1109/SYSCON.2011.5929123","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929123","url":null,"abstract":"This paper describes the scope of the problem regarding software vulnerabilities and the current state of the practice in static code analysis for software assurance. Recommendations are made regarding the use of static analysis methods and tools during the software life. Static code analysis touch points in during life cycle reviews and challenges to automated static code analysis are also discussed.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127341424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A scalable Role-based Group Key Agreement and Role Identification mechanism 一个可扩展的基于角色的组密钥协议和角色识别机制
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929100
J. Bian, R. Seker, U. Topaloglu, Coskun Bayrak
Large-scale organizations often use role-based hierarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to the problem of securing group communication (i.e. multiple-peer communication) along with the difficulty of managing such communication system in a large-scale and role-based environment. A role-based conference key generation algorithm is proposed to produce chained-keys by recursive hashing. The proposed work makes it possible that a user with a higher clearance can audit the communications among the users that are hierarchically below him/her. Furthermore, the compartmentalization problem in the previous version is solved by introducing Role Identification Certificates (RICs) using the same key-chain algorithm, so that communications within a group will not be exposed to the outsiders. A centralized key management server is used to securely dispatch the keys to each communicating entity based on his/her role. This lowers the cost associated with deployment of a good Random Number Generator (RNG) and reduces the packet size compared to traditional PKI systems.
大型组织经常使用基于角色的等级系统来管理人力资源。同时,安全通信是保护组织知识产权的基本要素。在本文中,我们提出了一种解决方案来保护群体通信(即多对等通信)以及在基于角色的大规模环境中管理此类通信系统的困难。提出了一种基于角色的会议密钥生成算法,通过递归哈希生成链密钥。建议的工作使得具有更高权限的用户可以审计层次低于他/她的用户之间的通信。此外,通过引入使用相同密钥链算法的角色识别证书(Role Identification Certificates, RICs)来解决先前版本中的分区问题,从而使组内的通信不会暴露给外部人员。使用集中式密钥管理服务器,根据每个通信实体的角色安全地将密钥分发给每个通信实体。这降低了与部署好的随机数生成器(RNG)相关的成本,并且与传统PKI系统相比减小了数据包大小。
{"title":"A scalable Role-based Group Key Agreement and Role Identification mechanism","authors":"J. Bian, R. Seker, U. Topaloglu, Coskun Bayrak","doi":"10.1109/SYSCON.2011.5929100","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929100","url":null,"abstract":"Large-scale organizations often use role-based hierarchical systems for managing human resources. Meanwhile, secure communication is an essential element in protecting an organization's intellectual property. In this paper, we propose a solution to the problem of securing group communication (i.e. multiple-peer communication) along with the difficulty of managing such communication system in a large-scale and role-based environment. A role-based conference key generation algorithm is proposed to produce chained-keys by recursive hashing. The proposed work makes it possible that a user with a higher clearance can audit the communications among the users that are hierarchically below him/her. Furthermore, the compartmentalization problem in the previous version is solved by introducing Role Identification Certificates (RICs) using the same key-chain algorithm, so that communications within a group will not be exposed to the outsiders. A centralized key management server is used to securely dispatch the keys to each communicating entity based on his/her role. This lowers the cost associated with deployment of a good Random Number Generator (RNG) and reduces the packet size compared to traditional PKI systems.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128129671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SOA migration case studies and lessons learned SOA迁移案例研究和经验教训
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929124
Pushparani Bhallamudi, S. Tilley
Service-Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing enterprise systems where business needs and technical solutions are closely aligned. SOA offers a number of potential benefits, such as cost-efficiency and agility. To exploit the benefits that SOA offers, several organizations are adopting a services model for leveraging their existing legacy systems. Migration to SOA can give new life to the existing legacy, but if not done correctly the migration can also lead to failure. There are several factors for this, such as technology selection, migration approach, type of legacy system, and SOA governance. One way to learn how to achieve success and avoid failure is through a thorough analysis of existing work in this field. This paper reports on a study that analyzed existing SOA migration projects to learn from them the factors that influence the success or failure of their efforts. A mechanism called the Evolution Process Framework for SOA was used to structure the analysis. Three SOA migration case studies and one experience report were analyzed. Lessons learned from each study are summarized, with crosscutting issues distilled from across all four studies presented. One of the most important lessons learned is the significance of well-defined policies and procedures for defining, publishing, and maintaining services.
面向服务的体系结构(SOA)是一种设计、开发、部署和管理业务需求和技术解决方案紧密结合的企业系统的方法。SOA提供了许多潜在的好处,比如成本效率和敏捷性。为了利用SOA提供的好处,一些组织正在采用服务模型来利用他们现有的遗留系统。迁移到SOA可以给现有遗留项目带来新的生命,但如果做得不正确,迁移也可能导致失败。这有几个因素,比如技术选择、迁移方法、遗留系统的类型和SOA治理。学习如何获得成功和避免失败的一个方法是通过对该领域现有工作的彻底分析。本文报告了一项研究,该研究分析了现有的SOA迁移项目,以从中了解影响其工作成功或失败的因素。使用了一种称为SOA演进过程框架的机制来构建分析。分析了三个SOA迁移案例研究和一个经验报告。总结了从每项研究中吸取的经验教训,并从所有四项研究中提炼出横切问题。最重要的经验教训之一是定义、发布和维护服务的良好定义的策略和过程的重要性。
{"title":"SOA migration case studies and lessons learned","authors":"Pushparani Bhallamudi, S. Tilley","doi":"10.1109/SYSCON.2011.5929124","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929124","url":null,"abstract":"Service-Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing enterprise systems where business needs and technical solutions are closely aligned. SOA offers a number of potential benefits, such as cost-efficiency and agility. To exploit the benefits that SOA offers, several organizations are adopting a services model for leveraging their existing legacy systems. Migration to SOA can give new life to the existing legacy, but if not done correctly the migration can also lead to failure. There are several factors for this, such as technology selection, migration approach, type of legacy system, and SOA governance. One way to learn how to achieve success and avoid failure is through a thorough analysis of existing work in this field. This paper reports on a study that analyzed existing SOA migration projects to learn from them the factors that influence the success or failure of their efforts. A mechanism called the Evolution Process Framework for SOA was used to structure the analysis. Three SOA migration case studies and one experience report were analyzed. Lessons learned from each study are summarized, with crosscutting issues distilled from across all four studies presented. One of the most important lessons learned is the significance of well-defined policies and procedures for defining, publishing, and maintaining services.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126861766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
An Architectural Efficiency based methodology for assessing the relative merit of synchronous vs. asynchronous service invocations 一种基于体系结构效率的方法,用于评估同步与异步服务调用的相对优点
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929058
G. Zakharia
There are very few architectural issues that invite as much religious ardor as the question of whether to connect to a remote service asynchronously or synchronously. To arguments of architectural decoupling in favor of the asynchronous option some architects and developers will continue to argue in favor of the simplicity of the synchronous option. This paper proposes to introduce new insights to such debate through an Architectural Efficiency analysis, an approach that will turn out to reveal major differentiators between the two alternatives, thus also validating the methodology to this particular domain of analysis.
很少有架构问题会像异步还是同步连接到远程服务的问题那样引起如此多的狂热。对于支持异步选项的体系结构解耦的争论,一些架构师和开发人员将继续支持同步选项的简单性。本文建议通过架构效率分析为这种争论引入新的见解,这种方法将揭示两种选择之间的主要区别,从而也验证了这种特定分析领域的方法。
{"title":"An Architectural Efficiency based methodology for assessing the relative merit of synchronous vs. asynchronous service invocations","authors":"G. Zakharia","doi":"10.1109/SYSCON.2011.5929058","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929058","url":null,"abstract":"There are very few architectural issues that invite as much religious ardor as the question of whether to connect to a remote service asynchronously or synchronously. To arguments of architectural decoupling in favor of the asynchronous option some architects and developers will continue to argue in favor of the simplicity of the synchronous option. This paper proposes to introduce new insights to such debate through an Architectural Efficiency analysis, an approach that will turn out to reveal major differentiators between the two alternatives, thus also validating the methodology to this particular domain of analysis.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124826038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 IEEE International Systems Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1