Industrial Application of a MDM-Based Approach for Generation and Impact Analysis of Adaptation Options - a Case Study

Author(s):  
Xuan Luu Hoang ◽  
Alexander Fay ◽  
Philipp Marks ◽  
Michael Weyrich
2021 ◽  
pp. 5-1-5-34
Author(s):  
Miguel Larrañeta ◽  
Carlos Fernández-Peruchena ◽  
Manuel A. Silva Pérez

Author(s):  
Luis Santos-Correa ◽  
Diego Pineda-Maigua ◽  
Fernando Ortega-Loza ◽  
Jhonatan Meza-Cartagena ◽  
Ignacio Abril-Naranjo ◽  
...  

Author(s):  
Ersin Er ◽  
Bedir Tekinerdogan

Model-Driven Software Development (MDSD) aims to support the development and evolution of software intensive systems using the basic concepts of model, metamodel, and model transformation. In parallel with the ongoing academic research, MDSD is more and more applied in industrial practices. Like conventional non-MDSD practices, MDSD systems are also subject to changing requirements and have to cope with evolution. In this chapter, the authors provide a scenario-based approach for documenting and analyzing the impact of changes that apply to model-driven development systems. To model the composition and evolution of an MDSD system, they developed the so-called Model-Driven Software Evolution Language (MoDSEL) which is based on a megamodel for MDSD. MoDSEL includes explicit language abstractions to specify both the model elements of an MDSD system and the evolution scenarios that might apply to model elements. Based on MoDSEL specifications, an impact analysis is performed to assess the impact of evolution scenarios and the sensitivity of model elements. A case study is provided to show different kind of evolution scenarios and the required adaptations to model elements.


2021 ◽  
pp. 41-57
Author(s):  
Gregory Falco ◽  
Eric Rosenbach

The question “How do I assess our cyber risk?” addresses how to identify and characterize cyber risk unique to an organization’s critical systems, networks, and data. The chapter begins with a case study about a cyberattack on Ukraine’s electric grid. It details risk assessment for three types of critical systems: mission-critical systems, business-critical systems, and safety-critical systems. It explains the three types of networks critical to many organizations: business and administrative networks, operational and service delivery networks, and communication networks. In outlining the “CIA triad,” it shows how cyber risk can be characterized as a confidentiality, integrity, or availability issue relating to digital assets. Further, it describes how to assess the importance of different digital assets and how to prioritize them using a business impact analysis (BIA). The chapter concludes with real-world Embedded Endurance strategy lessons Rosenbach gained in Saudi Arabia in the wake of one of the world’s most destructive cyberattacks.


Sign in / Sign up

Export Citation Format

Share Document