Capturing transparency-related requirements patterns through argumentation

Author(s):  
Mauricio Serrano ◽  
Julio Cesar Sampaio do Prado Leite
2015 ◽  
pp. 875-896
Author(s):  
Kristian Beckers ◽  
Isabelle Côté ◽  
Ludger Goeke ◽  
Selim Güler ◽  
Maritta Heisel

Cloud computing systems offer an attractive alternative to traditional IT-systems, because of economic benefits that arise from the cloud's scalable and flexible IT-resources. The benefits are of particular interest for SME's. The reason is that using Cloud Resources allows an SME to focus on its core business rather than on IT-resources. However, numerous concerns about the security of cloud computing services exist. Potential cloud customers have to be confident that the cloud services they acquire are secure for them to use. Therefore, they have to have a clear set of security requirements covering their security needs. Eliciting these requirements is a difficult task, because of the amount of stakeholders and technical components to consider in a cloud environment. Therefore, the authors propose a structured, pattern-based method supporting eliciting security requirements and selecting security measures. The method guides potential cloud customers to model the application of their business case in a cloud computing context using a pattern-based approach. Thus, a potential cloud customer can instantiate our so-called Cloud System Analysis Pattern. Then, the information of the instantiated pattern can be used to fill-out our textual security requirements patterns and individual defined security requirement patterns, as well. The presented method is tool-supported. Our tool supports the instantiation of the cloud system analysis pattern and automatically transfers the information from the instance to the security requirements patterns. In addition, they have validation conditions that check e.g., if a security requirement refers to at least one element in the cloud. The authors illustrate their method using an online-banking system as running example.


Author(s):  
Sascha Konrad ◽  
Laura A. Campbell ◽  
Betty H. C. Cheng ◽  
Min Deng

2014 ◽  
Vol 5 (2) ◽  
pp. 20-43 ◽  
Author(s):  
Kristian Beckers ◽  
Isabelle Côté ◽  
Ludger Goeke ◽  
Selim Güler ◽  
Maritta Heisel

Cloud computing systems offer an attractive alternative to traditional IT-systems, because of economic benefits that arise from the cloud's scalable and flexible IT-resources. The benefits are of particular interest for SME's. The reason is that using Cloud Resources allows an SME to focus on its core business rather than on IT-resources. However, numerous concerns about the security of cloud computing services exist. Potential cloud customers have to be confident that the cloud services they acquire are secure for them to use. Therefore, they have to have a clear set of security requirements covering their security needs. Eliciting these requirements is a difficult task, because of the amount of stakeholders and technical components to consider in a cloud environment. Therefore, the authors propose a structured, pattern-based method supporting eliciting security requirements and selecting security measures. The method guides potential cloud customers to model the application of their business case in a cloud computing context using a pattern-based approach. Thus, a potential cloud customer can instantiate our so-called Cloud System Analysis Pattern. Then, the information of the instantiated pattern can be used to fill-out our textual security requirements patterns and individual defined security requirement patterns, as well. The presented method is tool-supported. Our tool supports the instantiation of the cloud system analysis pattern and automatically transfers the information from the instance to the security requirements patterns. In addition, they have validation conditions that check e.g., if a security requirement refers to at least one element in the cloud. The authors illustrate their method using an online-banking system as running example.


2017 ◽  
Vol 42 (1) ◽  
pp. 32-33
Author(s):  
Julio C.S.P. Leite ◽  
Liping Zhao ◽  
Sylwia Kopczńska ◽  
Sam Supakkul ◽  
Lawrence Chung

2018 ◽  
Vol 18 (1) ◽  
pp. 192-197 ◽  

Abstract In 2007, Shanxi Provincial Institute of Archaeology conducted excavation to the Dahekou Cemetery of the Western Zhou Dynasty in Yicheng County. In the excavated M1, the wooden parts of the lacquered wares have decayed away and were very difficult to recover and process suitably in the fieldwork condition. Because of this, Conservation and Research Center for Cultural Heritage of the Institute of Archaeology, CASS was invited to conduct laboratory archaeology to these artifacts. By the onsite preservation and reinforcing processing and entire encasing acquisition, these artifacts and their burial context were removed to the laboratory and subject to recovery. The suitable propping materials and reinforcing reagents were selected to comprehensively process and conserve. These methods provided technological standards for the processing and preservation of the lacquered wooden objects unearthed from the semiarid areas; the completion of this project also clarified the characteristics, requirements, patterns and workflow of the laboratory archaeology.


Sign in / Sign up

Export Citation Format

Share Document