2020 ◽  
Vol 26 (1) ◽  
Author(s):  
Emanuel F. Coutinho ◽  
Carla I. M. Bezerra

Abstract A Software Ecosystem (SECO) refers to a collection of software products with some degree of symbiotic relationship. SOLAR is a Virtual Learning Environment (VLE) that enables the publication of courses and interaction with them among its various users. In this context, SOLAR SECO emerges, where diverse situations of software evolution and maintenance are part of its development process. The aim of this paper is to discuss the dynamic variability of SOLAR educational software ecosystem and software modeling. As an example, dynamic variability aspects of the feature model of SOLAR VLE discussion forum functionality were discussed, one of the most widely used services within SOLAR SECO. As a major conclusion of this work, we identified that the use of the contextual feature diagram allows the study of the dynamic aspects of a system, even more supported by tools to support automatic measurement collection.


Author(s):  
Wang Hongbing ◽  
Jing Qi ◽  
Liu Heng ◽  
Wang Zhao ◽  
Cheng Li

2014 ◽  
Vol 2014 ◽  
pp. 1-9 ◽  
Author(s):  
Kuei-Hu Chang

Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system’s elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.


Author(s):  
Kristian Beckers ◽  
Maritta Heisel ◽  
Leanid Krautsevich ◽  
Fabio Martinelli ◽  
Rene Meis ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document