When a Paradigm is Inconsistent with Intuition: The Case of Inconsistency Management

Author(s):  
Irit Hadar ◽  
Anna Zamansky
Author(s):  
Maria Vanina Martinez ◽  
Francesco Parisi ◽  
Andrea Pugliese ◽  
Gerardo I. Simari ◽  
V. S. Subrahmanian

Author(s):  
Tom Mens ◽  
Ragnhild Van Der Straeten ◽  
Jocelyn Simmonds

As the standard for object-oriented analysis and design, the UML (Unified Modeling Language) metamodel, as well as contemporary CASE (Computer-Aided Software Engineering) tools, must provide adequate and integrated support for all essential aspects of software evolution. This includes version control, traceability, impact analysis, change propagation, inconsistency management, and model refactorings. This chapter focuses on the latter two aspects, and shows how tool support for these aspects can be provided. First, we extend the UML metamodel with support for versioning. Second, we make a classification of the possible inconsistencies of UML design models. Finally, we use the formalism of description logics, a decidable fragment of first-order predicate logic, to express logic rules that can detect and resolve these inconsistencies. We also show how the logic rules are used to propose model refactorings. As a proof of concept, we report on the results of initial experiments with a prototype tool we developed for this approach.


2021 ◽  
Author(s):  
Pragati Shrivastava ◽  
Kotaro Kataoka

<p>The hybrid software-defined networks (SDN) architectures are beneficial for a smooth transition and less costly SDN deployment. However, legacy switches and SDN switches coexistence brings new challenges of deployment inconsistency management and security. Security is not well studied for hybrid SDN architecture. In this paper, we study the topology poisoning attacks in hybrid SDN for the first time. We propose new attack vectors for link fabrication in hybrid SDN. The new attack is named “multi-hop link fabrication”, in which an adversary successfully injects a fake multi-hop link (MHL) by exploiting the link discovery protocols. We presented the Hybrid-Shield, a link verification framework for hybrid SDN link discovery. Hybrid-Shield introduces a novel verification technique that includes: i) monitoring legacy switch and host generated traffic at MHL and ii) validating the existence of legacy switches contained in an MHL. This paper presents the prototype implementation of Hybrid-Shield over a real SDN controller. The experimental evaluation is performed with the mininet virtual network emulation. Our evaluation shows that Hybrid-Shield is capable of detecting MHL fabrication attacks in real-time with high accuracy. Hybrid-Shield’s performance evaluation shows that it is lightweight at the controller as it causes less overhead and requires no additional functionalities at the SDN controller for deployment.</p>


2014 ◽  
Vol 55 (2) ◽  
pp. 501-528 ◽  
Author(s):  
Maria Vanina Martinez ◽  
Francesco Parisi ◽  
Andrea Pugliese ◽  
Gerardo I. Simari ◽  
V.S. Subrahmanian

Sign in / Sign up

Export Citation Format

Share Document