Abstract. Telecommunication services are widespread and subject today to tensions on a competitive market. Telecommunication service design is more and more software oriented. To reduce time to market and cost of services, a service designer better need to simulate and evaluate his design earlier. The approach proposed in this paper is to reduce the abstraction gap between modeling and simulation phases using model transformation. But manual transformations are so far time consuming and error prone. As a trustworthy solution, model based techniques and associated transformations permit to systematically link service models with simulation phase before realization. We thus propose as a first contribution a meta-model dedicated to concepts of IP Multimedia Subsystem core network as a case study. Our meta-model constrains and defines such network entities to be used in the code generation, which is our second contribution. The implementation of a video conference service permits to illustrate our workbench.
The vast majority of worldwide goods exchanges are made by sea. In some parts of the world, the concurrence for dominance at sea is very high and definitely seen as a main military goal. Meanwhile, new generation ships highly rely on information systems for communication, navigation and platform management. This ever-spreading attack surface and permanent satellite links have grown a concern about the potential impact of cyberattacks on a ship at sea or on naval shore infrastructures. Therefore, on top of the usual cyberprotection measures taken for safety reasons, it is essential to implement an ongoing cyber monitoring of ships in order to detect, react accordingly, and stop any incoming threat.In this paper, we explain the specific constraints when trying to assess the cyber situation awareness of maritime information systems. As we will demonstrate, those systems combine physical and logical constraints which complexify their cyber monitoring process and architecture. Gathering valuable data while having a limited and controlled impact on the satellite bandwidth, maintaining a high level of integrity on remote systems in production are, for instance, thriving challenges for both civilian and military ships. We have designed and set up a research platform which fulfils those specifications to streamline the cyber monitoring process. We will then describe the architecture used to detect cyber-threats and collect potential Indices of Compromise from naval systems, as well as the results we have currently achieved.
In an earlier context, we have proposed a metadata model for service description. It describes service by three levels of properties: static properties (like its provider, its location and so on), behavior and interface. We have used ontologies in order to index and store the properties provided by this model. We have developed and implement tools which constitute a trader based on ontologies to discover a service by querying its three levels of description from ontologies. Based on the metadata model that we have proposed, we propose in this paper, an approach which allows the client to compose and to combine services by using our trader. This approach defines three models of composition : static, semi_dynamique and dynamique. These models allow the client to benefit from the functionalities of more than one service and to combine them at run-time and at compile-time to get novel services which provide novel functionalities.
The competitive market forces organizations to be agile and flexible so as to react robustly to complex events. Modeling helps managing this complexity. However, in order to model an enterprise, many stakeholders, with different expertise, must work together and take decisions. These decisions and their rationale are not always captured explicitly, in a standard, formal manner. The main problem is to persuade stakeholders to capture them. This article synthesizes an approach for capturing and using the rationale behind enterprise modeling decisions. The approach is implemented through a Domain Specific Modeling Language, defined as an extension of a standard Enterprise Architecture Modeling Language. It promotes coordination, enables presenting different stakeholders' points of view, facilities participation and collaboration in modeling activities-activities focused here on Enterprise Architecture viewpoints. To present its benefits, such as rapid prototyping, the approach is applied to large organizations in the context of Telecommunications service design. It is exemplified on modeling and capturing decisions on a conference service.
Abstract. The growing number of older people emerges the need to consider autonomy concerns for those people and their need for intensive care. Plenty of researches, such as those in the domain of Ambient Assisted Living Systems, have been carried out to create enhanced conditions for older and people with disabilities, based on providing ICT solutions that enhance the well-being of elderly people and provide them with well independent daily living. In this paper, for better efficiency for such solutions, different essential requirements should be realized to meet those system objectives towards various users. These requirements are identified and introduced. Set of systems has been introduced with their solutions and provided services architecture, to reach the main goal of this work, by evaluating these systems from identified requirements perspective, by studying the functionalities of each system, if they meet the proposed requirements.
In this paper, we propose an approach of security risk-driven contextual model for software systems development. The approach is model-driven using enterprise business architecture as the basis for the contextual models definition, associating security risk concerns. Enterprise Architecture (EA) enables the description of an organisation's structure, its business and its underlying Information System. By using a Model-Driven Engineering (MDE) approach such as Model-Driven Architecture (MDA), we define an architecture for models, and we provide a set of guidelines for structuring specifications expressed as (EA) contextual models. Then these models are enhanced to integrate security aspects in the overall development process. The proposal aims to analyse enterprise security from a business-oriented view and define security requirements inherited by the lower architectures, particularly IS architecture. The approach provides a meta-model of business contextual risk with a security management process, consisting on a systematic method, guiding to risk modelling and risk treatment strategies.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.