首页 > 最新文献

2011 Sixth International Conference on Availability, Reliability and Security最新文献

英文 中文
Some Security Issues in SCALANCE Wireless Industrial Networks SCALANCE无线工业网络中的一些安全问题
Marius Cristea, B. Groza, Mihai Iacob
We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network control systems. After the identification of the Stuxnet worm, which targeted PLCs from uranium enrichment facilities in Iran, these devices become of increased interest to the security community. Here we analyze them both in a static environment, at the configuration level, as well as in a dynamic environment where they are used for a remote control scenario. We show some vulnerabilities in both situations, in particular some weaknesses in the authentication protocol from their web-based configuration interface and an attack which halts the communication by using deauthentication packets. As proof-of-concept we simulate the evolution of a process which is controlled over the wireless network and could be seriously affected by an adversary unless a local controller is present for redundancy in case of communication failures.
我们讨论了Scalance无线接入点和客户端的一些安全弱点。这些设备由西门子公司开发,通常用于网络控制系统的无线通信。在发现了以伊朗铀浓缩设施的plc为目标的Stuxnet蠕虫病毒之后,安全界对这些设备的兴趣越来越大。这里,我们在静态环境(配置级别)和动态环境(用于远程控制场景)中对它们进行分析。我们在这两种情况下都展示了一些漏洞,特别是基于web的配置接口的认证协议中的一些弱点,以及通过使用脱认证数据包停止通信的攻击。作为概念验证,我们模拟了一个过程的演变,该过程通过无线网络控制,可能受到对手的严重影响,除非在通信故障的情况下存在冗余的本地控制器。
{"title":"Some Security Issues in SCALANCE Wireless Industrial Networks","authors":"Marius Cristea, B. Groza, Mihai Iacob","doi":"10.1109/ARES.2011.74","DOIUrl":"https://doi.org/10.1109/ARES.2011.74","url":null,"abstract":"We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network control systems. After the identification of the Stuxnet worm, which targeted PLCs from uranium enrichment facilities in Iran, these devices become of increased interest to the security community. Here we analyze them both in a static environment, at the configuration level, as well as in a dynamic environment where they are used for a remote control scenario. We show some vulnerabilities in both situations, in particular some weaknesses in the authentication protocol from their web-based configuration interface and an attack which halts the communication by using deauthentication packets. As proof-of-concept we simulate the evolution of a process which is controlled over the wireless network and could be seriously affected by an adversary unless a local controller is present for redundancy in case of communication failures.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115806283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hidden Price of User Authentication: Cost Analysis and Stakeholder Motivation 用户认证的隐性价格:成本分析与利益相关者动机
Ludwig Meyer, M. Auer, M. Klemen, S. Biffl
IT security is a vital task; user authentication a fundamental part. Yet the policies to implement user authentication often have a poor cost/benefit ratio. This paper (i) analyzes the costs of typical user authentication policies based on interviews with large Austrian IT providers. It (ii) then elaborates on how the policies are chosen, focusing on a lack of real cost accounting, and riskaverse principal agents in the security departments.
资讯科技保安是一项重要的工作;用户身份验证是最基本的部分。然而,实现用户身份验证的策略通常具有较低的成本/收益比。本文(i)基于对奥地利大型IT提供商的采访,分析了典型用户身份验证策略的成本。它(ii)然后详细说明了如何选择政策,重点是缺乏真正的成本核算,以及在安全部门规避风险的代理人。
{"title":"Hidden Price of User Authentication: Cost Analysis and Stakeholder Motivation","authors":"Ludwig Meyer, M. Auer, M. Klemen, S. Biffl","doi":"10.1109/ARES.2011.54","DOIUrl":"https://doi.org/10.1109/ARES.2011.54","url":null,"abstract":"IT security is a vital task; user authentication a fundamental part. Yet the policies to implement user authentication often have a poor cost/benefit ratio. This paper (i) analyzes the costs of typical user authentication policies based on interviews with large Austrian IT providers. It (ii) then elaborates on how the policies are chosen, focusing on a lack of real cost accounting, and riskaverse principal agents in the security departments.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114605317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practitioners' Perspectives on Security in Agile Development 敏捷开发中实践者对安全的看法
Steffen Bartsch
Agile methods are widely employed to develop high-quality software, but theoretical analyses argue that agile methods are inadequate for security-critical projects. However, most agile-developed software today needs to satisfy baseline security requirements, so that we need to focus on how to achieve this this level for typical agile projects. In this paper, we provide insights from the practitioner's perspective on security in agile development and report on exploratory, qualitative findings from interviews. Our findings extend the theoretical prior work and suggest to focus on adequate customer involvement, developer security awareness and expertise, and continuously improving the development process for security.
敏捷方法被广泛用于开发高质量的软件,但是理论分析认为敏捷方法不适用于安全关键项目。然而,今天大多数敏捷开发的软件都需要满足基线安全性需求,因此我们需要关注如何在典型的敏捷项目中达到这一水平。在本文中,我们提供了从实践者的角度对敏捷开发中的安全性的见解,并报告了从访谈中获得的探索性、定性的发现。我们的发现扩展了先前的理论工作,并建议将重点放在充分的客户参与、开发人员的安全意识和专业知识上,并不断改进安全的开发过程。
{"title":"Practitioners' Perspectives on Security in Agile Development","authors":"Steffen Bartsch","doi":"10.1109/ARES.2011.82","DOIUrl":"https://doi.org/10.1109/ARES.2011.82","url":null,"abstract":"Agile methods are widely employed to develop high-quality software, but theoretical analyses argue that agile methods are inadequate for security-critical projects. However, most agile-developed software today needs to satisfy baseline security requirements, so that we need to focus on how to achieve this this level for typical agile projects. In this paper, we provide insights from the practitioner's perspective on security in agile development and report on exploratory, qualitative findings from interviews. Our findings extend the theoretical prior work and suggest to focus on adequate customer involvement, developer security awareness and expertise, and continuously improving the development process for security.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
ACON: Activity-Centric Access Control for Social Computing ACON:以活动为中心的社会计算访问控制
Jaehong Park, R. Sandhu, Yuan Cheng
With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the average user, security and privacy has become a pressing problem that must be addressed. We propose the concept of user and SCS activity as a natural aspect of social computing which influences access control in a manner distinct to SCSs. We propose an activity-centric access control or Activity Control (ACON) framework for social computing to facilitate both privacy setting from user side and administration from SCS side. We further propose an ACONuser model for user activity control and session management. We illustrate how the model captures the user activities using several SC examples.
随着社会计算系统中存储的敏感用户数据数量的增加,以及如何在普通用户有意义的控制下保护这些数据缺乏共识,安全和隐私已成为一个迫切需要解决的问题。我们提出用户和SCS活动的概念,作为社会计算的一个自然方面,它以一种与SCS不同的方式影响访问控制。我们为社会计算提出了一个以活动为中心的访问控制或活动控制(ACON)框架,以方便用户侧的隐私设置和SCS侧的管理。我们进一步提出了用于用户活动控制和会话管理的ACONuser模型。我们使用几个SC示例来说明模型如何捕获用户活动。
{"title":"ACON: Activity-Centric Access Control for Social Computing","authors":"Jaehong Park, R. Sandhu, Yuan Cheng","doi":"10.1109/ARES.2011.42","DOIUrl":"https://doi.org/10.1109/ARES.2011.42","url":null,"abstract":"With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the average user, security and privacy has become a pressing problem that must be addressed. We propose the concept of user and SCS activity as a natural aspect of social computing which influences access control in a manner distinct to SCSs. We propose an activity-centric access control or Activity Control (ACON) framework for social computing to facilitate both privacy setting from user side and administration from SCS side. We further propose an ACONuser model for user activity control and session management. We illustrate how the model captures the user activities using several SC examples.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121643775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
PUF Based Scalable Private RFID Authentication 基于PUF的可扩展私有RFID认证
Mete Akgün, M. Çaglayan
In this paper, we propose a privacy-preserving authentication scheme for RFID systems with fast lookup time. Our solution is based on the use of Physically Unclonable Functions (PUFs). Although there are many proposals that addresses the security and privacy issues of RFID, the search efficiency still remains as a challenging issue. A first treebased mutual authentication scheme for RFID systems has been proposed by Molnar and Wagner to solve the search efficiency problem. The large communication overhead of this scheme has been reduced by Dimitriou performing the authentication with one message from the tag to the reader. However, tree-based schemes are vulnerable to tag compromising attack due to lack key-updating mechanism. Therefore, tree-based schemes are weak private in the Vaudenay-Model. In this paper, we present a tree-based authentication protocol for RFID systems that is destructive-private in the Vaudenay-Model. Our proposed scheme provides resistance against tag compromising attack by using PUFs as a secure storage to keep secrets of the tag. Keywords-RFID; Security; Privacy; Authentication; PUF;
本文提出了一种具有快速查找时间的RFID系统隐私保护认证方案。我们的解决方案是基于物理不可克隆函数(puf)的使用。尽管有许多方案解决了RFID的安全和隐私问题,但搜索效率仍然是一个具有挑战性的问题。为了解决搜索效率问题,Molnar和Wagner提出了RFID系统的第一个基于树的相互认证方案。Dimitriou通过从标签到阅读器的一条消息执行身份验证,减少了该方案的大量通信开销。然而,由于缺乏密钥更新机制,基于树的方案容易受到标签妥协攻击。因此,基于树的方案在vaudenay模型中是弱私有的。在本文中,我们提出了一个基于树的RFID系统认证协议,该协议在vaudenay模型中是破坏性私有的。我们提出的方案通过使用puf作为安全存储来保存标签的秘密,从而抵抗标签泄露攻击。Keywords-RFID;安全;隐私;身份验证;PUF;
{"title":"PUF Based Scalable Private RFID Authentication","authors":"Mete Akgün, M. Çaglayan","doi":"10.1109/ARES.2011.73","DOIUrl":"https://doi.org/10.1109/ARES.2011.73","url":null,"abstract":"In this paper, we propose a privacy-preserving authentication scheme for RFID systems with fast lookup time. Our solution is based on the use of Physically Unclonable Functions (PUFs). Although there are many proposals that addresses the security and privacy issues of RFID, the search efficiency still remains as a challenging issue. A first treebased mutual authentication scheme for RFID systems has been proposed by Molnar and Wagner to solve the search efficiency problem. The large communication overhead of this scheme has been reduced by Dimitriou performing the authentication with one message from the tag to the reader. However, tree-based schemes are vulnerable to tag compromising attack due to lack key-updating mechanism. Therefore, tree-based schemes are weak private in the Vaudenay-Model. In this paper, we present a tree-based authentication protocol for RFID systems that is destructive-private in the Vaudenay-Model. Our proposed scheme provides resistance against tag compromising attack by using PUFs as a secure storage to keep secrets of the tag. Keywords-RFID; Security; Privacy; Authentication; PUF;","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125325598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Effective Security Impact Analysis with Patterns for Software Enhancement 使用模式进行软件增强的有效安全影响分析
T. Okubo, H. Kaiya, Nobukazu Yoshioka
Unlike functional implementations, it is difficult to analyze the impact software enhancements on security. One of the difficulties is identifying the range of effects by new security threats, and the other is developing proper countermeasures. This paper proposes an analysis process that uses two kinds of security pattern: security requirements patterns (SRP) for identifying threats and security design patterns (SDP) for identifying countermeasures at an action class level. With these two patterns and the conventional traceability methodology, developers can estimate and compare the amounts of modifications needed by multiple security countermeasures.
与功能实现不同,很难分析软件增强对安全性的影响。其中一个困难是确定新的安全威胁的影响范围,另一个困难是制定适当的对策。本文提出了一个使用两种安全模式的分析过程:用于识别威胁的安全需求模式(SRP)和用于识别行动类级别上的对策的安全设计模式(SDP)。使用这两种模式和传统的可跟踪性方法,开发人员可以估计和比较多种安全对策所需的修改量。
{"title":"Effective Security Impact Analysis with Patterns for Software Enhancement","authors":"T. Okubo, H. Kaiya, Nobukazu Yoshioka","doi":"10.1109/ARES.2011.79","DOIUrl":"https://doi.org/10.1109/ARES.2011.79","url":null,"abstract":"Unlike functional implementations, it is difficult to analyze the impact software enhancements on security. One of the difficulties is identifying the range of effects by new security threats, and the other is developing proper countermeasures. This paper proposes an analysis process that uses two kinds of security pattern: security requirements patterns (SRP) for identifying threats and security design patterns (SDP) for identifying countermeasures at an action class level. With these two patterns and the conventional traceability methodology, developers can estimate and compare the amounts of modifications needed by multiple security countermeasures.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"37 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117084293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective 角色挖掘过程模型-强调需要一个全面的研究视角
L. Fuchs, S. Meier
Organizations that migrate from identity-centric to role-based Identity Management face the initial task of defining a valid set of roles for their employees. Due to its capabilities of automated and fast role detection, role mining as a solution for dealing with this challenge has gathered a rapid increase of interest in the academic community. Research activities throughout the last years resulted in a large number of different approaches, each covering specific aspects of the challenge. In this paper, firstly, a survey of the research area provides insight into the development of the field, underlining the need for a comprehensive perspective on role mining. Consecutively, a generic process model for role mining including pre- and post-processing activities is introduced and existing research activities are classified according to this model. The goal is to provide a basis for evaluating potentially valuable combinations of those approaches in the future.
从以身份为中心迁移到基于角色的身份管理的组织面临着为其员工定义一组有效角色的初始任务。由于其自动化和快速的角色检测能力,角色挖掘作为应对这一挑战的解决方案已经在学术界引起了越来越多的兴趣。过去几年的研究活动产生了大量不同的方法,每一种方法都涉及这一挑战的具体方面。本文首先对研究领域进行了综述,对该领域的发展进行了洞察,强调需要从一个全面的角度来看待角色挖掘。在此基础上,提出了一个包含预处理和后处理活动的角色挖掘通用过程模型,并根据该模型对已有的研究活动进行了分类。目标是为将来评估这些方法的潜在价值组合提供一个基础。
{"title":"The Role Mining Process Model - Underlining the Need for a Comprehensive Research Perspective","authors":"L. Fuchs, S. Meier","doi":"10.1109/ARES.2011.12","DOIUrl":"https://doi.org/10.1109/ARES.2011.12","url":null,"abstract":"Organizations that migrate from identity-centric to role-based Identity Management face the initial task of defining a valid set of roles for their employees. Due to its capabilities of automated and fast role detection, role mining as a solution for dealing with this challenge has gathered a rapid increase of interest in the academic community. Research activities throughout the last years resulted in a large number of different approaches, each covering specific aspects of the challenge. In this paper, firstly, a survey of the research area provides insight into the development of the field, underlining the need for a comprehensive perspective on role mining. Consecutively, a generic process model for role mining including pre- and post-processing activities is introduced and existing research activities are classified according to this model. The goal is to provide a basis for evaluating potentially valuable combinations of those approaches in the future.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126785102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Security and Privacy in Companies: State-of-the-art and Qualitative Analysis 公司的安全和隐私:最新的和定性的分析
B. Krumay, M. Oetzel
Privacy and security are relevant topics in both -- research and practice. Although they are often used together, implicitly assuming that they represent the same concept, they actually represent different concepts that are closely related. First, this paper presents a way to differentiate between these two topics from a conceptual point of view. Furthermore, it depicts some commonly accepted privacy regulations that exist in the OECD, EU and US. Second, we show how privacy and security are defined and implemented in practice, based on three interviews, conducted in different Austrian companies. The interviews picture the specific situation in the companies. Similarities and differences between the three interviews as well as between the interviews as a whole and the conceptual considerations were found and are described. To explain the maturity of these companies in terms of their understanding of privacy and security, we analyzed and visualized the interviews.
隐私和安全在研究和实践中都是相关的主题。虽然它们经常一起使用,隐含地假设它们表示相同的概念,但实际上它们表示密切相关的不同概念。首先,本文提出了一种从概念角度区分这两个主题的方法。此外,它还描述了经合组织、欧盟和美国存在的一些普遍接受的隐私法规。其次,我们根据在不同的奥地利公司进行的三次访谈,展示了隐私和安全在实践中是如何定义和实施的。面试描述了公司的具体情况。发现并描述了三次访谈之间以及访谈整体和概念考虑之间的异同。为了解释这些公司对隐私和安全的理解是否成熟,我们对访谈进行了分析和可视化。
{"title":"Security and Privacy in Companies: State-of-the-art and Qualitative Analysis","authors":"B. Krumay, M. Oetzel","doi":"10.1109/ARES.2011.53","DOIUrl":"https://doi.org/10.1109/ARES.2011.53","url":null,"abstract":"Privacy and security are relevant topics in both -- research and practice. Although they are often used together, implicitly assuming that they represent the same concept, they actually represent different concepts that are closely related. First, this paper presents a way to differentiate between these two topics from a conceptual point of view. Furthermore, it depicts some commonly accepted privacy regulations that exist in the OECD, EU and US. Second, we show how privacy and security are defined and implemented in practice, based on three interviews, conducted in different Austrian companies. The interviews picture the specific situation in the companies. Similarities and differences between the three interviews as well as between the interviews as a whole and the conceptual considerations were found and are described. To explain the maturity of these companies in terms of their understanding of privacy and security, we analyzed and visualized the interviews.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126377488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Product Line Engineering in Large-Scale Lean and Agile Software Product Development Environments - Towards a Hybrid Approach to Decentral Control and Managed Reuse 大规模精益和敏捷软件产品开发环境中的产品线工程——走向分散控制和管理重用的混合方法
Benjamin Blau, T. Hildenbrand
Despite the fact that lean and agile software development has become mainstream recently, especially for larger-scale organizations building complex products, the methodology leaves many architectural questions unanswered. For instance, agile methods such as Extreme Programming propose late architectural decisions and frequent refactoring, while others suggest an “architectural runway” as infrastructure for a certain set of upcoming customer features. Software “product lines” consist of a set of software products that share a common, managed set of features. These product lines are developed from reusable core assets incorporating variations in order to derive customer-specific product variants. Hence, this research explores interoperability and complementarity of lean and agile approaches in combination with a software product line engineering approach. With this position paper, we discuss both, (i) complementing architectural issues in large scale lean and agile development and (ii) providing methodological guidance to make product line engineering more agile and efficient. In doing so, we come to the conclusion that this combination enables us to build the right products in time and budget. Our findings are based on observations and experience from a large-scale software company with several thousand developers working on various solution combinations of highly interdependent products.
尽管事实上精益和敏捷软件开发最近已经成为主流,特别是对于构建复杂产品的大型组织来说,这种方法留下了许多架构上的问题没有得到回答。例如,极限编程等敏捷方法建议后期的架构决策和频繁的重构,而其他方法则建议将 œarchitectural跑道作为一组即将到来的客户功能的基础设施。软件 - œproduct线由一组软件产品组成,这些产品共享一组通用的、受管理的特性。这些产品线是从可重用的核心资产中开发出来的,这些核心资产包含了各种变体,以便派生出特定于客户的产品变体。因此,本研究探索了与软件产品线工程方法相结合的精益和敏捷方法的互操作性和互补性。在这份立场文件中,我们讨论了(i)在大规模精益和敏捷开发中补充架构问题,以及(ii)提供方法指导,使产品线工程更加敏捷和高效。在这样做的过程中,我们得出的结论是,这种组合使我们能够在时间和预算内构建正确的产品。我们的发现是基于对一家大型软件公司的观察和经验,该公司拥有数千名开发人员,他们致力于高度相互依赖的产品的各种解决方案组合。
{"title":"Product Line Engineering in Large-Scale Lean and Agile Software Product Development Environments - Towards a Hybrid Approach to Decentral Control and Managed Reuse","authors":"Benjamin Blau, T. Hildenbrand","doi":"10.1109/ARES.2011.66","DOIUrl":"https://doi.org/10.1109/ARES.2011.66","url":null,"abstract":"Despite the fact that lean and agile software development has become mainstream recently, especially for larger-scale organizations building complex products, the methodology leaves many architectural questions unanswered. For instance, agile methods such as Extreme Programming propose late architectural decisions and frequent refactoring, while others suggest an “architectural runway” as infrastructure for a certain set of upcoming customer features. Software “product lines” consist of a set of software products that share a common, managed set of features. These product lines are developed from reusable core assets incorporating variations in order to derive customer-specific product variants. Hence, this research explores interoperability and complementarity of lean and agile approaches in combination with a software product line engineering approach. With this position paper, we discuss both, (i) complementing architectural issues in large scale lean and agile development and (ii) providing methodological guidance to make product line engineering more agile and efficient. In doing so, we come to the conclusion that this combination enables us to build the right products in time and budget. Our findings are based on observations and experience from a large-scale software company with several thousand developers working on various solution combinations of highly interdependent products.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125857136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Security in Model Driven Development: A Survey 模型驱动开发中的安全性:综述
Jostein Jensen, M. Jaatun
Model driven development (MDD) is considered a promising approach for software development. In this paper the results of a systematic survey is reported to identify the state-of-the-art within the topic of security in model driven development, with a special focus on finding empirical studies. We provide an introduction to the major secure MDD initiatives, but our survey shows that there is a lack of empirical work on the topic. We conclude that better standardisation initiatives and more empirical research in the field is necessary before it can be considered mature.
模型驱动开发(MDD)被认为是一种很有前途的软件开发方法。在本文中,报告了一项系统调查的结果,以确定模型驱动开发中安全主题的最新进展,并特别关注寻找实证研究。我们提供了对主要的安全MDD计划的介绍,但是我们的调查显示在这个主题上缺乏经验工作。我们的结论是,在该领域被认为成熟之前,需要更好的标准化举措和更多的实证研究。
{"title":"Security in Model Driven Development: A Survey","authors":"Jostein Jensen, M. Jaatun","doi":"10.1109/ARES.2011.110","DOIUrl":"https://doi.org/10.1109/ARES.2011.110","url":null,"abstract":"Model driven development (MDD) is considered a promising approach for software development. In this paper the results of a systematic survey is reported to identify the state-of-the-art within the topic of security in model driven development, with a special focus on finding empirical studies. We provide an introduction to the major secure MDD initiatives, but our survey shows that there is a lack of empirical work on the topic. We conclude that better standardisation initiatives and more empirical research in the field is necessary before it can be considered mature.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123738661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2011 Sixth International Conference on Availability, Reliability and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1