Semantic Representation of Cloud Services: A Case Study for Openstack

Author(s):  
Beniamino Di Martino ◽  
Giuseppina Cretella ◽  
Antonio Esposito ◽  
Graziella Carta
Author(s):  
Muthu Ramachandran

This real-world case study has been used to demonstrate the best practices on business process modelling and component based design for developing cloud services with Build Security In (BSI). BSI techniques, strategies, and processes presented in this article are general systems security principles and are applicable for both a cloud environment and traditional environment (non-cloud environment). The significant contribution of this research is to illustrate the application of the extended system security method known as SysSQUARE to elicit security requirements, identify security threats of data, as well as integrating build-in security techniques by modelling and simulating business processes upfront in the systems development life cycle.


Author(s):  
Jose María Alvarez-Rodríguez ◽  
Roy Mendieta ◽  
Valentín Moreno ◽  
Miguel Sánchez-Puebla ◽  
Juan Llorens

This paper introduces a mechanism to recover traceability links between the requirements and logical models in the context of critical systems development. Currently, lifecycle processes are covered by a good number of tools that are used to generate different types of artifacts. One of the cornerstone capabilities in the development of critical systems lies in the possibility of automatically recovery traceability links between system artifacts generated in different lifecycle stages. To do so, it is necessary to establish to what extent two or more of these work products are similar, dependent or should be explicitly linked together. However, the different types of artifacts and their internal representation depict a major challenge to unify how system artifacts are represented and, then, linked together. That is why, in this work, a concept-based representation is introduced to provide a semantic and unified description of any system artifact. Furthermore, a traceability function is defined and implemented to exploit this new semantic representation and to support the recovery of traceability links between different types of system artifacts. In order to evaluate the traceability function, a case study in the railway domain is conducted to compare the precision and recall of recovery traceability links between text-based requirements and logical model elements. As the main outcome of this work, the use of a concept-based paradigm to represent that system artifacts are demonstrated as a building block to automatically recover traceability links within the development lifecycle of critical systems.


2019 ◽  
Author(s):  
Jordan Ferreira Saran ◽  
Leonardo Botega

Situational Awareness (SAW) refers to the level of consciousness that an individual or team holds over a situation. In the area of ​​risk management and criminal data analysis, SAW failures can induce human operators to make mistakes in decision making and pose risks to life or property. In this context, risk assessment processes, which commonly involves data mining, fusion and other methods, present opportunities to generate better information and contribute to the improvement of the SAW of crime and risk analysts. However, the characterization of complex scenarios is subject to problems of representation and expressiveness of the information, which may influence its interpretation due to their quality and significance, generating uncertainties. The state-of-the-art in representation of information on risk situations and related areas presents approaches with limited use of information quality. In addition, the solutions are restricted to syntactic mechanisms for the determination of relations between information, negatively restricting the assertiveness of the results. Thus, this paper aims to develop a new approach to semantic representation of information of risk situations, more specifically creating domain ontologies, instantiated with crime data and information quality. In a case study, real information on crimes, represented by the new semantic model and consumed by computational inference processes, was be processed, aiming to characterize robbery and theft situations.


passer ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 187-193
Author(s):  
Nigar Mahmoud Shafiq ◽  
Mohammed Y. Shakor

The global spread of Covid-19 has enhanced the adoption of virtual education and the use of technology in order to reduce the risk of contagion. Recently, the academics have turn out to be more technology-orientated and the educational establishments continue to seek opportunities in order to adopt an environment where all researchers could have access to high-quality scientific resources at anytime and anywhere in the world. Cloud computing is a model, which provides the users with services and application software on-demand, using the Internet. While the use of cloud computing applications is growing, there are ongoing research challenges related to guaranteeing security, privacy and the integration of the cloud applications. To the extent of our knowledge, the present study is the first from this type to thoroughly present the impacts of the COVID-19 pandemic on cloud computing environment in higher education institutions in Iraqi universities. This study will critically analysis the views of the faculty staff and researchers in Iraqi universities on cloud computing. It also tries to take a quick look at how Iraqi university staff responded to the epidemic in terms of research activities. The results shows that about 99% of the respondents considered the cloud applications to have great role in encouraging the research works in their institutes. Concerning the benefits of cloud services, the availability and saving cost were selected as most important factors that encouraging the adoption of cloud services. On the other hand, issues related to performance, lack of user control were selected as major problems in applying cloud services in Iraqi institutions Finally, it can be concluding that reducing the risks of the security, authorization, control and providing better performance of cloud services can enhance the use of cloud applications by researchers at Iraqi universities.


Sign in / Sign up

Export Citation Format

Share Document