首页 > 最新文献

Int. J. Syst. Softw. Secur. Prot.最新文献

英文 中文
A Light Weight Temper Resistance Client File in an External Memory for Remote User Authentication and Access Control 外部存储器中用于远程用户认证和访问控制的轻量级耐篡改客户端文件
Pub Date : 2023-02-16 DOI: 10.4018/ijsssp.318342
Bello Alhaji Buhari, A. Obiniyi, S. Junaidu, A. F. Donfack Kana
This research proposes a lightweight tamper resistant client file in an external memory as an alternative to smart card for remote user authentication and access control. The benefit of using this special client file is portability and ease of acquirement, especially in school online portals, online resources portals, and e-commerce portals. The characteristics and design considerations that make smart card tamper resistant are reviewed. Techniques and characteristics to make a client file in an external memory to exhibit a lightweight tamper resistant property has been formulated. The Kumari et al.'s scheme, which is the latest research that uses external memory for remote user authentication, has been reviewed. The basic system design and software design of the proposed client file is presented and modeled. This will enable implementation of the proposed system using any prepared programming or scripting language of one's choice. The proposed scheme and reviewed scheme are also evaluated for efficiency, tamper resistance, and impersonation attack.
本研究提出了一个轻量级的防篡改客户端文件在外部存储器作为智能卡的替代品,用于远程用户身份验证和访问控制。使用这种特殊客户端文件的好处是可移植性和易于获取,特别是在学校在线门户、在线资源门户和电子商务门户中。回顾了智能卡防篡改的特点和设计考虑。制定了使外部存储器中的客户机文件具有轻量级抗篡改特性的技术和特征。本文综述了Kumari等人提出的利用外部存储器进行远程用户认证的最新研究方案。提出了客户端文件的基本系统设计和软件设计,并对其进行了建模。这将使您能够使用自己选择的任何准备好的编程或脚本语言来实现所建议的系统。并对提出的方案和审查的方案进行了效率、抗篡改和模拟攻击的评估。
{"title":"A Light Weight Temper Resistance Client File in an External Memory for Remote User Authentication and Access Control","authors":"Bello Alhaji Buhari, A. Obiniyi, S. Junaidu, A. F. Donfack Kana","doi":"10.4018/ijsssp.318342","DOIUrl":"https://doi.org/10.4018/ijsssp.318342","url":null,"abstract":"This research proposes a lightweight tamper resistant client file in an external memory as an alternative to smart card for remote user authentication and access control. The benefit of using this special client file is portability and ease of acquirement, especially in school online portals, online resources portals, and e-commerce portals. The characteristics and design considerations that make smart card tamper resistant are reviewed. Techniques and characteristics to make a client file in an external memory to exhibit a lightweight tamper resistant property has been formulated. The Kumari et al.'s scheme, which is the latest research that uses external memory for remote user authentication, has been reviewed. The basic system design and software design of the proposed client file is presented and modeled. This will enable implementation of the proposed system using any prepared programming or scripting language of one's choice. The proposed scheme and reviewed scheme are also evaluated for efficiency, tamper resistance, and impersonation attack.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117309098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed Secure 3-Use Case Diagram 建议的安全3-用例图
Pub Date : 2022-01-01 DOI: 10.4018/ijsssp.293237
Madhuri Gedam, B. Meshram
The global use of UML diagrams serving as a baseline for the development of software leads to the mandatory consideration of non-functional requirements providing a secure and robust application. Secure SRS model with CIA-AAA provides the consideration of non-functional requirements and quality attributes before authorizing the users for accessing use cases. The extensive literature survey for UML Use case diagram is done. The UML use case diagrams do not provide notations, stereotypes, constraint for mis-use case and defense mechanism. This paper describes various notations, the new stereotypes such as Authentication, Buffer Overflow, SQL Injection, Encryption, Session Expiration and Connection Flooding with mathematical modelling for mitigating the attacks on the various transactions or use cases handle by the actors for providing the security.
作为软件开发基线的UML图的全局使用导致必须考虑提供安全和健壮的应用程序的非功能需求。使用CIA-AAA的安全SRS模型在授权用户访问用例之前,提供了对非功能需求和质量属性的考虑。对UML用例图进行了广泛的文献调查。UML用例图不提供符号、原型、对错误用例的约束和防御机制。本文描述了各种符号,新的构造型,如身份验证、缓冲区溢出、SQL注入、加密、会话过期和连接泛滥,并通过数学建模来减轻对各种事务或参与者处理的用例的攻击,以提供安全性。
{"title":"Proposed Secure 3-Use Case Diagram","authors":"Madhuri Gedam, B. Meshram","doi":"10.4018/ijsssp.293237","DOIUrl":"https://doi.org/10.4018/ijsssp.293237","url":null,"abstract":"The global use of UML diagrams serving as a baseline for the development of software leads to the mandatory consideration of non-functional requirements providing a secure and robust application. Secure SRS model with CIA-AAA provides the consideration of non-functional requirements and quality attributes before authorizing the users for accessing use cases. The extensive literature survey for UML Use case diagram is done. The UML use case diagrams do not provide notations, stereotypes, constraint for mis-use case and defense mechanism. This paper describes various notations, the new stereotypes such as Authentication, Buffer Overflow, SQL Injection, Encryption, Session Expiration and Connection Flooding with mathematical modelling for mitigating the attacks on the various transactions or use cases handle by the actors for providing the security.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126906052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Formal Metamodeling for Secure Model-Driven Engineering 安全模型驱动工程的形式化元建模
Pub Date : 2021-07-01 DOI: 10.4018/IJSSSP.2021070104
L. Favre
Systems and applications aligned with new paradigms such as cloud computing and internet of the things are becoming more complex and interconnected, expanding the areas in which they are susceptible to attacks. Their security can be addressed by using model-driven engineering (MDE). In this context, specific IoT or cloud computing metamodels emerged to support the systematic development of software. In general, they are specified through semiformal metamodels in MOF style. This article shows the theoretical foundations of a method for automatically constructing secure metamodels in the context of realizations of MDE such as MDA. The formal metamodeling language Nereus and systems of transformation rules to bridge the gap between formal specifications and MOF are described. The main contribution of this article is the definition of a system of transformation rules called NEREUStoMOF for transforming automatically formal metamodeling specifications in Nereus to semiformal-MOF metamodels annotated in OCL.
与云计算和物联网等新范式相一致的系统和应用程序正变得更加复杂和相互关联,从而扩大了它们容易受到攻击的领域。它们的安全性可以通过使用模型驱动工程(MDE)来解决。在这种背景下,特定的物联网或云计算元模型出现,以支持软件的系统开发。通常,它们是通过MOF风格的半正式元模型指定的。本文展示了在MDE(如MDA)实现上下文中自动构建安全元模型的方法的理论基础。描述了形式化元建模语言Nereus和转换规则系统,以弥合形式化规范和MOF之间的差距。本文的主要贡献是定义了一个名为NEREUStoMOF的转换规则系统,用于将Nereus中的形式化元建模规范自动转换为OCL注释的半形式化元模型。
{"title":"Formal Metamodeling for Secure Model-Driven Engineering","authors":"L. Favre","doi":"10.4018/IJSSSP.2021070104","DOIUrl":"https://doi.org/10.4018/IJSSSP.2021070104","url":null,"abstract":"Systems and applications aligned with new paradigms such as cloud computing and internet of the things are becoming more complex and interconnected, expanding the areas in which they are susceptible to attacks. Their security can be addressed by using model-driven engineering (MDE). In this context, specific IoT or cloud computing metamodels emerged to support the systematic development of software. In general, they are specified through semiformal metamodels in MOF style. This article shows the theoretical foundations of a method for automatically constructing secure metamodels in the context of realizations of MDE such as MDA. The formal metamodeling language Nereus and systems of transformation rules to bridge the gap between formal specifications and MOF are described. The main contribution of this article is the definition of a system of transformation rules called NEREUStoMOF for transforming automatically formal metamodeling specifications in Nereus to semiformal-MOF metamodels annotated in OCL.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124264424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Iterated Function System-Based Model for Coloured Image Encryption 一种新的基于迭代函数系统的彩色图像加密模型
Pub Date : 2021-07-01 DOI: 10.4018/IJSSSP.2021070101
Amine Rahmani
Chaotic cryptography has been a well-studied domain over the last few years. Many works have been done, and the researchers are still getting benefit from this incredible mathematical concept. This paper proposes a new model for coloured image encryption using simple but efficient chaotic equations. The proposed model consists of a symmetric encryption scheme in which it uses the logistic equation to generate secrete keys then an affine recursive transformation to encrypt pixels' values. The experimentations show good results, and theoretic discussion proves the efficiency of the proposed model.
在过去的几年里,混沌密码学一直是一个研究得很好的领域。许多工作已经完成,研究人员仍然从这个令人难以置信的数学概念中获益。本文提出了一种利用简单而有效的混沌方程进行彩色图像加密的新模型。该模型由一个对称加密方案组成,其中使用逻辑方程生成密钥,然后使用仿射递归变换对像素值进行加密。实验取得了良好的效果,理论讨论也证明了该模型的有效性。
{"title":"A Novel Iterated Function System-Based Model for Coloured Image Encryption","authors":"Amine Rahmani","doi":"10.4018/IJSSSP.2021070101","DOIUrl":"https://doi.org/10.4018/IJSSSP.2021070101","url":null,"abstract":"Chaotic cryptography has been a well-studied domain over the last few years. Many works have been done, and the researchers are still getting benefit from this incredible mathematical concept. This paper proposes a new model for coloured image encryption using simple but efficient chaotic equations. The proposed model consists of a symmetric encryption scheme in which it uses the logistic equation to generate secrete keys then an affine recursive transformation to encrypt pixels' values. The experimentations show good results, and theoretic discussion proves the efficiency of the proposed model.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117328872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc Networks: A Practical Comprehension 基于异常的移动自组织网络入侵检测系统:一个实用的理解
Pub Date : 2021-07-01 DOI: 10.4018/IJSSSP.2021070102
S. Valiveti, Anush Manglani, Tadrush Desai
Ad hoc networks are used in heterogeneous environments like tactical military applications, where no centrally coordinated infrastructure is available. The network is required to perform self-configuration, dynamic topology management, and ensure the self-sustainability of the network. Security is hence of paramount importance. Anomaly-based intrusion detection system (IDS) is a distributed activity carried out by all nodes of the network in a cooperative manner along with other related network activities like routing, etc. Machine learning and its advances have found a promising place in anomaly detection. This paper describes the journey of defining the most suitable routing protocol for implementing IDS for tactical applications, along with the selection of the related suitable data set. The paper also reviews the latest machine learning techniques, implementation capabilities, and limitations.
自组织网络用于异构环境,如战术军事应用,其中没有中央协调的基础设施可用。要求网络具备自配置、动态拓扑管理功能,保证网络的自持续性。因此,安全是最重要的。基于异常的入侵检测系统(IDS)是一种分布式的活动,由网络的所有节点协同路由等相关网络活动共同完成。机器学习及其进步已经在异常检测中找到了一个有前途的地方。本文描述了为战术应用程序实现IDS定义最合适的路由协议的过程,以及相关合适数据集的选择。本文还回顾了最新的机器学习技术、实现能力和局限性。
{"title":"Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc Networks: A Practical Comprehension","authors":"S. Valiveti, Anush Manglani, Tadrush Desai","doi":"10.4018/IJSSSP.2021070102","DOIUrl":"https://doi.org/10.4018/IJSSSP.2021070102","url":null,"abstract":"Ad hoc networks are used in heterogeneous environments like tactical military applications, where no centrally coordinated infrastructure is available. The network is required to perform self-configuration, dynamic topology management, and ensure the self-sustainability of the network. Security is hence of paramount importance. Anomaly-based intrusion detection system (IDS) is a distributed activity carried out by all nodes of the network in a cooperative manner along with other related network activities like routing, etc. Machine learning and its advances have found a promising place in anomaly detection. This paper describes the journey of defining the most suitable routing protocol for implementing IDS for tactical applications, along with the selection of the related suitable data set. The paper also reviews the latest machine learning techniques, implementation capabilities, and limitations.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131817547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloud Computing Virtual Machine Workload Prediction Method Based on Variational Autoencoder 基于变分自编码器的云计算虚拟机工作负荷预测方法
Pub Date : 2021-07-01 DOI: 10.4018/IJSSSP.2021070103
F. Abdullayeva
The paper proposes a method for predicting the workload of virtual machines in the cloud infrastructure. Reconstruction probabilities of variational autoencoders were used to provide the prediction. Reconstruction probability is a probability criterion that considers the variability in the distribution of variables. In the proposed approach, the values of the reconstruction probabilities of the variational autoencoder show the workload level of the virtual machines. The results of the experiments showed that variational autoencoders gave better results in predicting the workload of virtual machines compared to simple deep neural networks. The generative characteristics of the variational autoencoders determine the workload level by the data reconstruction.
本文提出了一种预测云基础设施中虚拟机工作负载的方法。利用变分自编码器的重构概率进行预测。重构概率是一种考虑变量分布变异性的概率准则。在该方法中,变分自编码器的重构概率值反映了虚拟机的工作负载水平。实验结果表明,与简单的深度神经网络相比,变分自编码器在预测虚拟机工作负载方面具有更好的效果。变分自编码器的生成特性通过数据重构来决定工作负荷的高低。
{"title":"Cloud Computing Virtual Machine Workload Prediction Method Based on Variational Autoencoder","authors":"F. Abdullayeva","doi":"10.4018/IJSSSP.2021070103","DOIUrl":"https://doi.org/10.4018/IJSSSP.2021070103","url":null,"abstract":"The paper proposes a method for predicting the workload of virtual machines in the cloud infrastructure. Reconstruction probabilities of variational autoencoders were used to provide the prediction. Reconstruction probability is a probability criterion that considers the variability in the distribution of variables. In the proposed approach, the values of the reconstruction probabilities of the variational autoencoder show the workload level of the virtual machines. The results of the experiments showed that variational autoencoders gave better results in predicting the workload of virtual machines compared to simple deep neural networks. The generative characteristics of the variational autoencoders determine the workload level by the data reconstruction.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131812391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CC-Case-Safety and Security Engineering Methodology 安全与保安工程方法论
Pub Date : 2021-01-01 DOI: 10.4018/IJSSSP.2021010101
Tomoko Kaneko, Nobukazu Yoshioka
As the complexity of computer systems increases, assuring safety and security is significant. The authors aim to construct a new development methodology CC-Case that can assure the demands of complex systems, including IoT and AI, using safety and security technologies in an integrated manner. As a central framework of CC-Case, this manuscript shows requirements extraction by STAMP/STPA extension to safety and security (STAMP S & S) and assurance using GSN divided into a logical model and a concrete model. STAMP S & S makes it possible to model requirements based on system theory and extract more comprehensive safety and security requirements in a single model diagram. Besides, the GSN defines the overall picture of the assurance and verifies and validates the hazards and threats extracted by STAMP S & S. This paper presents the procedures of CC-Case with STAMP, GSN, and show examples of level 3 autonomous driving.
随着计算机系统复杂性的增加,确保安全是非常重要的。作者的目标是构建一种新的开发方法CC-Case,可以确保复杂系统的需求,包括物联网和人工智能,以集成的方式使用安全和安保技术。作为CC-Case的中心框架,本文展示了通过STAMP/STPA扩展到安全和保障(STAMP S & S)的需求提取和使用GSN的保证,分为逻辑模型和具体模型。STAMP S & S使基于系统理论的需求建模成为可能,并在单个模型图中提取更全面的安全和保障需求。此外,GSN定义了保障的整体图景,并对STAMP S & S提取的危害和威胁进行验证和验证。本文介绍了使用STAMP、GSN进行CC-Case的流程,并展示了3级自动驾驶的示例。
{"title":"CC-Case-Safety and Security Engineering Methodology","authors":"Tomoko Kaneko, Nobukazu Yoshioka","doi":"10.4018/IJSSSP.2021010101","DOIUrl":"https://doi.org/10.4018/IJSSSP.2021010101","url":null,"abstract":"As the complexity of computer systems increases, assuring safety and security is significant. The authors aim to construct a new development methodology CC-Case that can assure the demands of complex systems, including IoT and AI, using safety and security technologies in an integrated manner. As a central framework of CC-Case, this manuscript shows requirements extraction by STAMP/STPA extension to safety and security (STAMP S & S) and assurance using GSN divided into a logical model and a concrete model. STAMP S & S makes it possible to model requirements based on system theory and extract more comprehensive safety and security requirements in a single model diagram. Besides, the GSN defines the overall picture of the assurance and verifies and validates the hazards and threats extracted by STAMP S & S. This paper presents the procedures of CC-Case with STAMP, GSN, and show examples of level 3 autonomous driving.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130833378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Composite Safety Assurance Method for Developing System Architecture Using Model Checking 一种基于模型检验的系统架构开发的复合安全保证方法
Pub Date : 2021-01-01 DOI: 10.4018/IJSSSP.2021010105
Qiang Zhi, Zhengshu Zhou, Shuji Morisaki
Assurance case helps analyze the system dependability, but the relationships between system elements and assurance case are generally not clearly defined. In order to make system assurance more intuitive and reliable, this paper proposes an approach that clearly defines the relationships between safety issues and system elements and integrates them using ArchiMate. Also, the proposed method applies model checking to system safety assurance, and the checking results are regarded as evidence of assurance cases. This method consists of four steps: interaction visualization, processes model checking, assurance case creation, and composite safety assurance. The significance of this work is that it provides a formalized procedure for safety-critical system assurance, which could increase the confidence in system safety. It would be expected to make the safety of a system easier to explain to third parties and make the system assurance more intuitive and effective. Also, a case study on an automatic driving system is carried out to confirm the effectiveness of this approach.
保证用例有助于分析系统的可靠性,但是系统元素和保证用例之间的关系通常没有明确的定义。为了使系统保障更加直观和可靠,本文提出了一种明确定义安全问题与系统要素之间关系的方法,并使用ArchiMate将它们集成起来。将模型检验应用于系统安全保障,并将检验结果作为保障案例的证据。该方法包括四个步骤:交互可视化、过程模型检查、保证用例创建和组合安全保证。这项工作的意义在于,它为安全关键系统保证提供了一个形式化的程序,可以增加对系统安全的信心。它将使系统的安全性更容易向第三方解释,并使系统保证更加直观和有效。最后,以某自动驾驶系统为例,验证了该方法的有效性。
{"title":"A Composite Safety Assurance Method for Developing System Architecture Using Model Checking","authors":"Qiang Zhi, Zhengshu Zhou, Shuji Morisaki","doi":"10.4018/IJSSSP.2021010105","DOIUrl":"https://doi.org/10.4018/IJSSSP.2021010105","url":null,"abstract":"Assurance case helps analyze the system dependability, but the relationships between system elements and assurance case are generally not clearly defined. In order to make system assurance more intuitive and reliable, this paper proposes an approach that clearly defines the relationships between safety issues and system elements and integrates them using ArchiMate. Also, the proposed method applies model checking to system safety assurance, and the checking results are regarded as evidence of assurance cases. This method consists of four steps: interaction visualization, processes model checking, assurance case creation, and composite safety assurance. The significance of this work is that it provides a formalized procedure for safety-critical system assurance, which could increase the confidence in system safety. It would be expected to make the safety of a system easier to explain to third parties and make the system assurance more intuitive and effective. Also, a case study on an automatic driving system is carried out to confirm the effectiveness of this approach.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131510587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enterprise Architecture-Based Project Assurance Model for the Proof-of-Concept of AI Service Systems 基于企业架构的人工智能服务系统概念验证项目保证模型
Pub Date : 2021-01-01 DOI: 10.4018/IJSSSP.2021010104
H. Takeuchi
This research considers the common understanding of proof-of-concept (PoC) projects developing AI service systems between business and IT divisions. The authors propose an enterprise architecture (EA)-based project assurance model for the PoC of AI service systems, and represented elements of the developed application, development processes, and project goals with relations in the model. The proposed model provides two views, the “Why-What-Who View” representing the relationships between goals, processes and actors, and “Who-What-How View” representing the relationships between actors, processes and applications. Through these views, this paper shows that project members can understand the development activities in which they are involved, and the impact or significance of each activity on the project, and the project goal is assured by executing each activity in the process. Through a case study the authors show that one can use the proposed model as a reference model when proposing and executing AI service system development projects.
本研究考虑了在业务和IT部门之间开发人工智能服务系统的概念验证(PoC)项目的共同理解。作者提出了一种基于企业架构(EA)的人工智能服务系统PoC项目保证模型,并将开发的应用程序、开发过程和项目目标的元素与模型中的关系表示出来。所建议的模型提供了两个视图,“Why-What-Who View”表示目标、过程和参与者之间的关系,“Who-What-How View”表示参与者、过程和应用程序之间的关系。通过这些观点,本文表明项目成员可以了解他们所参与的开发活动,以及每个活动对项目的影响或意义,并通过执行过程中的每个活动来保证项目目标的实现。通过实例研究表明,在提出和实施人工智能服务系统开发项目时,可以使用该模型作为参考模型。
{"title":"Enterprise Architecture-Based Project Assurance Model for the Proof-of-Concept of AI Service Systems","authors":"H. Takeuchi","doi":"10.4018/IJSSSP.2021010104","DOIUrl":"https://doi.org/10.4018/IJSSSP.2021010104","url":null,"abstract":"This research considers the common understanding of proof-of-concept (PoC) projects developing AI service systems between business and IT divisions. The authors propose an enterprise architecture (EA)-based project assurance model for the PoC of AI service systems, and represented elements of the developed application, development processes, and project goals with relations in the model. The proposed model provides two views, the “Why-What-Who View” representing the relationships between goals, processes and actors, and “Who-What-How View” representing the relationships between actors, processes and applications. Through these views, this paper shows that project members can understand the development activities in which they are involved, and the impact or significance of each activity on the project, and the project goal is assured by executing each activity in the process. Through a case study the authors show that one can use the proposed model as a reference model when proposing and executing AI service system development projects.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124435458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Six-Assurance Case Patterns by Strengthening/Weakening Argument 通过加强/削弱论证的六种保证案例模式
Pub Date : 2021-01-01 DOI: 10.4018/IJSSSP.2021010102
Tsutomu Koshiyama, Seiichiro Takahashi
Goal structuring notation (GSN) is widely used in safety cases and other methods for assuring reliability. Demonstrating the fulfillment of a claim in the GSN requires that its achievement be interpreted logically and structurally by the reader. This study proposes a typical pattern of interpreting these structural interpretations. Furthermore, the proposed patterns were verified for their application to actual GSN samples, and the applicability of these patterns was validated. In addition, these patterns were compared with the existing use of the so-called multi-legged arguments, and the differences between them were shown. Moreover, some of the proposed patterns show that there is a difference in the degree of certainty in the achievement of the converted claim, which indicates achievement of the claim from which it is derived.
目标结构符号(GSN)广泛应用于安全案例和其他保证可靠性的方法中。在GSN中证明权利要求的实现要求读者对其成就进行逻辑和结构上的解释。本研究提出了一种解释这些结构解释的典型模式。最后,将所提出的模式应用于实际的GSN样本,验证了模式的适用性。此外,还将这些模式与现有的所谓多腿论证的使用进行了比较,并指出了它们之间的差异。此外,所建议的一些模式表明,实现转换后的权利要求的确定性程度存在差异,这表明实现其派生的权利要求。
{"title":"Six-Assurance Case Patterns by Strengthening/Weakening Argument","authors":"Tsutomu Koshiyama, Seiichiro Takahashi","doi":"10.4018/IJSSSP.2021010102","DOIUrl":"https://doi.org/10.4018/IJSSSP.2021010102","url":null,"abstract":"Goal structuring notation (GSN) is widely used in safety cases and other methods for assuring reliability. Demonstrating the fulfillment of a claim in the GSN requires that its achievement be interpreted logically and structurally by the reader. This study proposes a typical pattern of interpreting these structural interpretations. Furthermore, the proposed patterns were verified for their application to actual GSN samples, and the applicability of these patterns was validated. In addition, these patterns were compared with the existing use of the so-called multi-legged arguments, and the differences between them were shown. Moreover, some of the proposed patterns show that there is a difference in the degree of certainty in the achievement of the converted claim, which indicates achievement of the claim from which it is derived.","PeriodicalId":135841,"journal":{"name":"Int. J. Syst. Softw. Secur. Prot.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131499777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Syst. Softw. Secur. Prot.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1