首页 > 最新文献

Software and Systems Modeling最新文献

英文 中文
P-stable abstractions of hybrid systems 混合系统的 P 稳定抽象
IF 2 3区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-29 DOI: 10.1007/s10270-023-01145-x
Anna Becchi, Alessandro Cimatti, Enea Zaffanella

Stability is a fundamental requirement of dynamical systems. Most of the works concentrate on verifying stability for a given stability region. In this paper, we tackle the problem of synthesizing ({mathbb {P}})-stable abstractions. Intuitively, the ({mathbb {P}})-stable abstraction of a dynamical system characterizes the transitions between stability regions in response to external inputs. The stability regions are not given—rather, they are synthesized as their most precise representation with respect to a given set of predicates ({mathbb {P}}). A ({mathbb {P}})-stable abstraction is enriched by timing information derived from the duration of stabilization. We implement a synthesis algorithm in the framework of Abstract Interpretation that allows different degrees of approximation. We show the representational power of ({mathbb {P}})-stable abstractions that provide a high-level account of the behavior of the system with respect to stability, and we experimentally evaluate the effectiveness of the algorithm in synthesizing ({mathbb {P}})-stable abstractions for significant systems.

稳定性是动力学系统的基本要求。大多数研究都集中于验证给定稳定区域的稳定性。在本文中,我们要解决的问题是合成 ({mathbb {P}})-stable 抽象。直观地说,动态系统的 ({mathbb {P}}) - 稳定抽象描述了响应外部输入时稳定区域之间的转换。稳定区域并不是给定的,而是根据给定的谓词集 ({mathbb {P}}) 合成的最精确的表示。稳定抽象由稳定持续时间的时序信息丰富。我们在 "抽象解释 "框架内实现了一种合成算法,允许不同程度的近似。我们展示了 ({mathbb {P}})-稳定抽象的表征能力,它提供了系统稳定性行为的高层次描述,我们还通过实验评估了该算法在为重要系统综合 ({mathbb {P}})-稳定抽象方面的有效性。
{"title":"P-stable abstractions of hybrid systems","authors":"Anna Becchi, Alessandro Cimatti, Enea Zaffanella","doi":"10.1007/s10270-023-01145-x","DOIUrl":"https://doi.org/10.1007/s10270-023-01145-x","url":null,"abstract":"<p>Stability is a fundamental requirement of dynamical systems. Most of the works concentrate on verifying stability for a given stability region. In this paper, we tackle the problem of <i>synthesizing</i> <span>({mathbb {P}})</span>-<i>stable abstractions</i>. Intuitively, the <span>({mathbb {P}})</span>-stable abstraction of a dynamical system characterizes the transitions between stability regions in response to external inputs. The stability regions are not given—rather, they are synthesized as their most precise representation with respect to a given set of predicates <span>({mathbb {P}})</span>. A <span>({mathbb {P}})</span>-stable abstraction is enriched by timing information derived from the duration of stabilization. We implement a synthesis algorithm in the framework of Abstract Interpretation that allows different degrees of approximation. We show the representational power of <span>({mathbb {P}})</span>-stable abstractions that provide a high-level account of the behavior of the system with respect to stability, and we experimentally evaluate the effectiveness of the algorithm in synthesizing <span>({mathbb {P}})</span>-stable abstractions for significant systems.</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"37 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139579531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A refinement-based approach to safe smart contract deployment and evolution 基于完善的安全智能合约部署和演进方法
IF 2 3区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-25 DOI: 10.1007/s10270-023-01143-z
Pedro Antonino, Juliandson Ferreira, Augusto Sampaio, A. W. Roscoe, Filipe Arruda

In our previous work, we proposed a verification framework that shifts from the “code is law” to a new “specification is law” paradigm related to the safe evolution of smart contracts. The framework proposed there relaxed the well-established requirement that, once a smart contract is deployed in a blockchain, its code is expected to be immutable. More flexibly, contracts are allowed to be created and upgraded provided they meet a corresponding formal specification that was fixed. In the current paper, we extend this framework to allow specifications to evolve, provided a refinement notion is preserved. We propose a notion of specification refinement tailored for smart contracts and a methodology for checking it. In addition to weakening preconditions and strengthening postconditions and invariants, we allow for the change of data representation and interface extension. Thus, we are able to reason about a significantly wider class of smart contract evolution histories, when contrasted with the original framework. The new framework is centred around a trusted deployer: an off-chain service that formally verifies and enforces the notions of implementation conformance and specification refinement. We have investigated its applicability to the safe deployment and upgrade of contracts implementing widely used Ethereum standards (the ERC20 Token Standard, the ERC3156 Flash Loans, the ERC1155 Multi Token Standard and The ERC721 standard for Non-Fungible Tokens); we handle evolutions possibly involving changes in data representation and interface extensions.

在我们之前的工作中,我们提出了一个验证框架,从 "代码即法律 "转变为与智能合约安全演进相关的新的 "规范即法律 "范式。该框架放宽了智能合约一旦部署到区块链中,其代码就必须是不可变的这一既定要求。更为灵活的是,只要符合相应的固定形式规范,就可以创建和升级合约。在本文中,我们对这一框架进行了扩展,允许规范在保留细化概念的前提下不断演进。我们提出了一个为智能合约量身定制的规范细化概念和一种检查方法。除了弱化前置条件、强化后置条件和不变式外,我们还允许改变数据表示和接口扩展。因此,与原始框架相比,我们能够推理出更广泛的智能合约演化历史。新框架以可信部署器为中心:它是一种链外服务,可以正式验证和执行执行一致性和规范完善的概念。我们研究了该框架在安全部署和升级执行广泛使用的以太坊标准(ERC20 代币标准、ERC3156 Flash Loans、ERC1155 多代币标准和 ERC721 非流通代币标准)的合约方面的适用性;我们处理的演进可能涉及数据表示和接口扩展的变化。
{"title":"A refinement-based approach to safe smart contract deployment and evolution","authors":"Pedro Antonino, Juliandson Ferreira, Augusto Sampaio, A. W. Roscoe, Filipe Arruda","doi":"10.1007/s10270-023-01143-z","DOIUrl":"https://doi.org/10.1007/s10270-023-01143-z","url":null,"abstract":"<p>In our previous work, we proposed a verification framework that shifts from the “code is law” to a new “specification is law” paradigm related to the safe evolution of smart contracts. The framework proposed there relaxed the well-established requirement that, once a smart contract is deployed in a blockchain, its code is expected to be immutable. More flexibly, contracts are allowed to be created and upgraded provided they meet a corresponding formal specification that was fixed. In the current paper, we extend this framework to allow specifications to evolve, provided a refinement notion is preserved. We propose a notion of specification refinement tailored for smart contracts and a methodology for checking it. In addition to weakening preconditions and strengthening postconditions and invariants, we allow for the change of data representation and interface extension. Thus, we are able to reason about a significantly wider class of smart contract evolution histories, when contrasted with the original framework. The new framework is centred around <i>a trusted deployer</i>: an off-chain service that formally verifies and enforces the notions of implementation conformance and specification refinement. We have investigated its applicability to the safe deployment and upgrade of contracts implementing widely used Ethereum standards (the ERC20 Token Standard, the ERC3156 Flash Loans, the ERC1155 Multi Token Standard and The ERC721 standard for Non-Fungible Tokens); we handle evolutions possibly involving changes in data representation and interface extensions.</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"40 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139554199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the testing skills transfer of model-based testing on testing skill acquisition 评估基于模型的测试对测试技能掌握的影响
IF 2 3区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-22 DOI: 10.1007/s10270-023-01141-1

Abstract

When creating a software model, it is necessary that it accurately captures the desired behaviour, while at the same time ensuring that any undesired behaviour is excluded. On the one hand, formal verification tools can be used to check the internal consistency of a software system, ensuring that the behaviour of one software component does not contradict another. On the other hand, software testing is essential to check the external validity of the model more comprehensively. Unfortunately, software testing is often overlooked in curricula, resulting in graduates with inadequate software testing skills for industry. Software testing tools such as TesCaV can be used to help teachers teach software testing topics in a non-intrusive and less time-consuming way. Previous research has shown that TesCaV is easy to use and that novice users produce better quality software tests when using TesCaV. However, it has remained unclear whether learners retain the skills they gain from using TesCaV even when the tool is not offered for help. In order to understand the positive effect of TesCaV on learners’ software testing skills, this study conducted an experiment with 45 participants. The experiment used a pretest-treatment-posttest design. The results show that participants feel equally confident about the completeness of their test coverage, even though they identify more test cases. It is concluded that for course design, a capsule such as TesCaV can help students to understand the full complexity of software testing and help them to be more systematic in their approach.

摘要 在创建软件模型时,必须准确捕捉所需的行为,同时确保排除任何不需要的行为。一方面,形式验证工具可用于检查软件系统的内部一致性,确保一个软件组件的行为不会与另一个软件组件的行为相矛盾。另一方面,软件测试对于更全面地检查模型的外部有效性至关重要。遗憾的是,软件测试往往在课程中被忽视,导致毕业生不具备足够的软件测试技能,无法为行业所用。软件测试工具(如 TesCaV)可用于帮助教师以非侵入式、更省时的方式讲授软件测试主题。以往的研究表明,TesCaV 易于使用,而且新手用户在使用 TesCaV 时能做出更高质量的软件测试。然而,学习者在使用 TesCaV 过程中获得的技能,即使在不提供工具帮助的情况下是否还能保留下来,这一点仍不清楚。为了了解 TesCaV 对学习者软件测试技能的积极影响,本研究对 45 名参与者进行了实验。实验采用了前测-治疗-后测的设计。结果表明,尽管学员识别了更多的测试用例,但他们对测试覆盖范围的完整性同样有信心。结论是,在课程设计中,TesCaV 这样的胶囊可以帮助学生理解软件测试的全部复杂性,并帮助他们在方法上更加系统化。
{"title":"Assessing the testing skills transfer of model-based testing on testing skill acquisition","authors":"","doi":"10.1007/s10270-023-01141-1","DOIUrl":"https://doi.org/10.1007/s10270-023-01141-1","url":null,"abstract":"<h3>Abstract</h3> <p>When creating a software model, it is necessary that it accurately captures the desired behaviour, while at the same time ensuring that any undesired behaviour is excluded. On the one hand, formal verification tools can be used to check the internal consistency of a software system, ensuring that the behaviour of one software component does not contradict another. On the other hand, software testing is essential to check the external validity of the model more comprehensively. Unfortunately, software testing is often overlooked in curricula, resulting in graduates with inadequate software testing skills for industry. Software testing tools such as TesCaV can be used to help teachers teach software testing topics in a non-intrusive and less time-consuming way. Previous research has shown that TesCaV is easy to use and that novice users produce better quality software tests when using TesCaV. However, it has remained unclear whether learners retain the skills they gain from using TesCaV even when the tool is not offered for help. In order to understand the positive effect of TesCaV on learners’ software testing skills, this study conducted an experiment with 45 participants. The experiment used a pretest-treatment-posttest design. The results show that participants feel equally confident about the completeness of their test coverage, even though they identify more test cases. It is concluded that for course design, a capsule such as TesCaV can help students to understand the full complexity of software testing and help them to be more systematic in their approach.</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"54 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139516789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling more software performance antipatterns in cyber-physical systems 为网络物理系统中的更多软件性能反模式建模
IF 2 3区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-12-20 DOI: 10.1007/s10270-023-01137-x
Riccardo Pinciroli, Connie U. Smith, Catia Trubiani

The design of cyber-physical systems (CPS) is challenging due to the heterogeneity of software and hardware components that operate in uncertain environments (e.g., fluctuating workloads), hence they are prone to performance issues. Software performance antipatterns could be a key means to tackle this challenge since they recognize design problems that may lead to unacceptable system performance. This manuscript focuses on modeling and analyzing a variegate set of software performance antipatterns with the goal of quantifying their performance impact on CPS. Starting from the specification of eight software performance antipatterns, we build a baseline queuing network performance model that is properly extended to account for the corresponding bad practices. The approach is applied to a CPS consisting of a network of sensors and experimental results show that performance degradation can be traced back to software performance antipatterns. Sensitivity analysis investigates the peculiar characteristics of antipatterns, such as the frequency of checking the status of resources, that provides quantitative information to software designers to help them identify potential performance problems and their root causes. Quantifying the performance impact of antipatterns on CPS paves the way for future work enabling the automated refactoring of systems to remove these bad practices.

网络物理系统(CPS)的设计极具挑战性,因为其软件和硬件组件具有异构性,且在不确定的环境中运行(如波动的工作负载),因此很容易出现性能问题。软件性能反模式是应对这一挑战的关键手段,因为它们能识别可能导致不可接受的系统性能的设计问题。本手稿侧重于对各种软件性能反模式进行建模和分析,目的是量化它们对 CPS 性能的影响。我们从八种软件性能反模式的规范出发,建立了一个基线队列网络性能模型,并对该模型进行了适当扩展,以考虑到相应的不良实践。实验结果表明,性能下降可追溯到软件性能反模式。敏感性分析研究了反模式的特殊性,如检查资源状态的频率,为软件设计者提供了量化信息,帮助他们识别潜在的性能问题及其根本原因。量化反模式对 CPS 性能的影响,为今后自动重构系统以消除这些不良做法的工作铺平了道路。
{"title":"Modeling more software performance antipatterns in cyber-physical systems","authors":"Riccardo Pinciroli, Connie U. Smith, Catia Trubiani","doi":"10.1007/s10270-023-01137-x","DOIUrl":"https://doi.org/10.1007/s10270-023-01137-x","url":null,"abstract":"<p>The design of cyber-physical systems (CPS) is challenging due to the heterogeneity of software and hardware components that operate in uncertain environments (e.g., fluctuating workloads), hence they are prone to performance issues. Software performance antipatterns could be a key means to tackle this challenge since they recognize design problems that may lead to unacceptable system performance. This manuscript focuses on modeling and analyzing a variegate set of software performance antipatterns with the goal of quantifying their performance impact on CPS. Starting from the specification of eight software performance antipatterns, we build a baseline queuing network performance model that is properly extended to account for the corresponding bad practices. The approach is applied to a CPS consisting of a network of sensors and experimental results show that performance degradation can be traced back to software performance antipatterns. Sensitivity analysis investigates the peculiar characteristics of antipatterns, such as the frequency of checking the status of resources, that provides quantitative information to software designers to help them identify potential performance problems and their root causes. Quantifying the performance impact of antipatterns on CPS paves the way for future work enabling the automated refactoring of systems to remove these bad practices.\u0000</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"33 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138821235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special section of BPMDS’2021 business process improvement BPMDS'2021 业务流程改进专栏
IF 2 3区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-12-18 DOI: 10.1007/s10270-023-01139-9

Abstract

The Business Process Modeling, Development and Support (BPMDS) working conference series, held in conjunction with CAiSE conferences, serve as a meeting place for researchers and practitioners in Business Process Modeling, Development, and Support. Business process analysis, design, and support, addressed by the BPMDS series, have been recognized as a central issue in information systems (IS) engineering. In 2011, BPMDS became a two-day working conference held in conjunction with CAiSE (Conference on Advanced Information Systems Engineering). The goals, format, and history of BPMDS can be found on the website http://www.bpmds.org/.

摘要 业务流程建模、开发和支持(BPMDS)工作会议系列与 CAiSE 会议同期举行,是业务流程建模、开发和支持领域研究人员和从业人员的聚会场所。BPMDS 系列所涉及的业务流程分析、设计和支持已被公认为信息系统 (IS) 工程的核心问题。2011 年,BPMDS 成为与 CAiSE(高级信息系统工程会议)同期举行的为期两天的工作会议。有关 BPMDS 的目标、形式和历史,请访问网站 http://www.bpmds.org/。
{"title":"Special section of BPMDS’2021 business process improvement","authors":"","doi":"10.1007/s10270-023-01139-9","DOIUrl":"https://doi.org/10.1007/s10270-023-01139-9","url":null,"abstract":"<h3>Abstract</h3> <p>The Business Process Modeling, Development and Support (BPMDS) working conference series, held in conjunction with CAiSE conferences, serve as a meeting place for researchers and practitioners in Business Process Modeling, Development, and Support. Business process analysis, design, and support, addressed by the BPMDS series, have been recognized as a central issue in information systems (IS) engineering. In 2011, BPMDS became a two-day working conference held in conjunction with CAiSE (Conference on Advanced Information Systems Engineering). The goals, format, and history of BPMDS can be found on the website http://www.bpmds.org/.</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"300 1 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138714339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest editorial for EMMSAD’2022 special section 为 EMMSAD 的 2022 专刊撰写客座社论
IF 2 3区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-12-08 DOI: 10.1007/s10270-023-01130-4
Iris Reinhartz-Berger, Dominik Bork
{"title":"Guest editorial for EMMSAD’2022 special section","authors":"Iris Reinhartz-Berger, Dominik Bork","doi":"10.1007/s10270-023-01130-4","DOIUrl":"https://doi.org/10.1007/s10270-023-01130-4","url":null,"abstract":"","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"58 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138587099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adopting the concept of a function as an underlying semantic paradigm for modeling languages 采用函数的概念作为建模语言的底层语义范式
IF 2 3区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-11-30 DOI: 10.1007/s10270-023-01140-2
Benoit Combemale, Jeff Gray, Bernhard Rumpe
{"title":"Adopting the concept of a function as an underlying semantic paradigm for modeling languages","authors":"Benoit Combemale, Jeff Gray, Bernhard Rumpe","doi":"10.1007/s10270-023-01140-2","DOIUrl":"https://doi.org/10.1007/s10270-023-01140-2","url":null,"abstract":"","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"16 2","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138519073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A theme section on the central role of modeling in designing and explaining data-driven systems and software 关于建模在设计和解释数据驱动型系统和软件中的核心作用的主题部分
IF 2 3区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-11-22 DOI: 10.1007/s10270-023-01133-1
Christian Attiogbé, Sadok Ben Yahia, Ladjel Bellatreche
{"title":"A theme section on the central role of modeling in designing and explaining data-driven systems and software","authors":"Christian Attiogbé, Sadok Ben Yahia, Ladjel Bellatreche","doi":"10.1007/s10270-023-01133-1","DOIUrl":"https://doi.org/10.1007/s10270-023-01133-1","url":null,"abstract":"","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"719 ","pages":"1945-1947"},"PeriodicalIF":2.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139248793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and enforcing access control policies in conversational user interfaces 在会话用户界面中建模和实施访问控制策略
IF 2 3区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-11-22 DOI: 10.1007/s10270-023-01131-3
Elena Planas, Salvador Martínez, Marco Brambilla, Jordi Cabot

Conversational user interfaces (CUIs), such as chatbots, are becoming a common component of many software systems. Although they are evolving in many directions (such as advanced language processing features, thanks to new AI-based developments), less attention has been paid to access control and other security concerns associated with CUIs, which may pose a clear risk to the systems they interface with. In this paper, we apply model-driven techniques to model and enforce access-control policies in CUIs. In particular, we present a fully fledged framework to integrate the role-based access-control (RBAC) protocol into CUIs by: (1) modeling a set of access-control rules to specify permissions over the bot resources using a domain-specific language that tailors core RBAC concepts to the CUI domain; and (2) describing a mechanism to show the feasibility of automatically generating the infrastructure to evaluate and enforce the modeled access control policies at runtime.

会话用户界面(CUIs),如聊天机器人,正在成为许多软件系统的常见组件。尽管它们在许多方向上不断发展(例如高级语言处理功能,这要归功于新的基于人工智能的开发),但对与gui相关的访问控制和其他安全问题的关注较少,这可能会对与它们交互的系统构成明显的风险。在本文中,我们应用模型驱动技术对gui中的访问控制策略进行建模和实施。特别地,我们提出了一个完全成熟的框架,通过以下方式将基于角色的访问控制(RBAC)协议集成到gui中:(1)建模一组访问控制规则,使用特定于域的语言指定对bot资源的权限,该语言将核心RBAC概念定制为CUI域;(2)描述了一种机制,以显示在运行时自动生成基础设施以评估和执行建模的访问控制策略的可行性。
{"title":"Modeling and enforcing access control policies in conversational user interfaces","authors":"Elena Planas, Salvador Martínez, Marco Brambilla, Jordi Cabot","doi":"10.1007/s10270-023-01131-3","DOIUrl":"https://doi.org/10.1007/s10270-023-01131-3","url":null,"abstract":"<p>Conversational user interfaces (CUIs), such as chatbots, are becoming a common component of many software systems. Although they are evolving in many directions (such as advanced language processing features, thanks to new AI-based developments), less attention has been paid to access control and other security concerns associated with CUIs, which may pose a clear risk to the systems they interface with. In this paper, we apply model-driven techniques to model and enforce access-control policies in CUIs. In particular, we present a fully fledged framework to integrate the role-based access-control (RBAC) protocol into CUIs by: (1) modeling a set of access-control rules to specify permissions over the bot resources using a domain-specific language that tailors core RBAC concepts to the CUI domain; and (2) describing a mechanism to show the feasibility of automatically generating the infrastructure to evaluate and enforce the modeled access control policies at runtime.\u0000</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"16 5","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138519071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What makes life for process mining analysts difficult? A reflection of challenges 是什么让过程挖掘分析师的生活变得困难?挑战的反映
IF 2 3区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-11-17 DOI: 10.1007/s10270-023-01134-0
Lisa Zimmermann, Francesca Zerbato, Barbara Weber

Over the past few years, several software companies have emerged that offer process mining tools to assist enterprises in gaining insights into their process executions. However, the effective application of process mining technologies depends on analysts who need to be proficient in managing process mining projects and providing process insights and improvement opportunities. To contribute to a better understanding of the difficulties encountered by analysts and to pave the way for the development of enhanced and tailored support for them, this work reveals the challenges they perceive in practice. In particular, we identify 23 challenges based on interviews with 41 analysts, which we validate using a questionnaire survey. We provide insights into the relevancy of the process mining challenges and present mitigation strategies applied in practice to overcome them. While mitigation strategies exist, our findings imply the need for further research to provide support for analysts along all phases of process mining projects on the individual level, but also the technical, group, and organizational levels.

在过去的几年中,出现了一些软件公司,它们提供过程挖掘工具来帮助企业获得对其过程执行的洞察。然而,过程挖掘技术的有效应用依赖于需要精通管理过程挖掘项目并提供过程洞察力和改进机会的分析人员。为了有助于更好地理解分析人员所遇到的困难,并为为他们提供加强和量身定制的支持铺平道路,这项工作揭示了他们在实践中感受到的挑战。特别是,我们根据与41位分析师的访谈确定了23个挑战,我们使用问卷调查来验证这些挑战。我们提供了对过程挖掘挑战的相关性的见解,并提出了在实践中应用的缓解策略,以克服这些挑战。虽然存在缓解策略,但我们的发现意味着需要进一步的研究,以便在个人层面上,以及在技术、团队和组织层面上,为过程挖掘项目的所有阶段的分析人员提供支持。
{"title":"What makes life for process mining analysts difficult? A reflection of challenges","authors":"Lisa Zimmermann, Francesca Zerbato, Barbara Weber","doi":"10.1007/s10270-023-01134-0","DOIUrl":"https://doi.org/10.1007/s10270-023-01134-0","url":null,"abstract":"<p>Over the past few years, several software companies have emerged that offer process mining tools to assist enterprises in gaining insights into their process executions. However, the effective application of process mining technologies depends on analysts who need to be proficient in managing process mining projects and providing process insights and improvement opportunities. To contribute to a better understanding of the difficulties encountered by analysts and to pave the way for the development of enhanced and tailored support for them, this work reveals the challenges they perceive in practice. In particular, we identify 23 challenges based on interviews with 41 analysts, which we validate using a questionnaire survey. We provide insights into the relevancy of the process mining challenges and present mitigation strategies applied in practice to overcome them. While mitigation strategies exist, our findings imply the need for further research to provide support for analysts along all phases of process mining projects on the individual level, but also the technical, group, and organizational levels.\u0000</p>","PeriodicalId":49507,"journal":{"name":"Software and Systems Modeling","volume":"16 3","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138519072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Software and Systems Modeling
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1