It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen who...It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform.展开更多
The rapid growth in software demand incentivizes software development organizations to develop exclusive software for their customers worldwide.This problem is addressed by the software development industry by softwar...The rapid growth in software demand incentivizes software development organizations to develop exclusive software for their customers worldwide.This problem is addressed by the software development industry by software product line(SPL)practices that employ feature models.However,optimal feature selection based on user requirements is a challenging task.Thus,there is a requirement to resolve the challenges of software development,to increase satisfaction and maintain high product quality,for massive customer needs within limited resources.In this work,we propose a recommender system for the development team and clients to increase productivity and quality by utilizing historical information and prior experiences of similar developers and clients.The proposed system recommends features with their estimated cost concerning new software requirements,from all over the globe according to similar developers’and clients’needs and preferences.The system guides and facilitates the development team by suggesting a list of features,code snippets,libraries,cheat sheets of programming languages,and coding references from a cloud-based knowledge management repository.Similarly,a list of features is suggested to the client according to their needs and preferences.The experimental results revealed that the proposed recommender system is feasible and effective,providing better recommendations to developers and clients.It provides proper and reasonably well-estimated costs to perform development tasks effectively as well as increase the client’s satisfaction level.The results indicate that there is an increase in productivity,performance,and quality of products and a reduction in effort,complexity,and system failure.Therefore,our proposed system facilitates developers and clients during development by providing better recommendations in terms of solutions and anticipated costs.Thus,the increase in productivity and satisfaction level maximizes the benefits and usability of SPL in the modern era of technology.展开更多
Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol ...Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol configuration also encounters those problems. This paper focuses on solving protocol component versioning issues for protocol configuration man- agement on embedded system, incorporating the following versioning issues: version identification, version description and protocol component archiving and retrieving based on the version library.展开更多
An enhanced system architecture of Web-based product structure and configuration management system along with its, functions are is presented. The key techniques, such as construction of object models of product str...An enhanced system architecture of Web-based product structure and configuration management system along with its, functions are is presented. The key techniques, such as construction of object models of product structure and product configuration, hybrid approach method in product configuration management, sharing and integration of heterogeneous product data, integration with other sub-systems, are discussed too. A prototype system is developed by J2EE technology.展开更多
As one of the most important attributes of software quality, software maintainability has been widely recognized.However,the existing maintainability evaluation methods are mostly based on subjectively judgment. Thus ...As one of the most important attributes of software quality, software maintainability has been widely recognized.However,the existing maintainability evaluation methods are mostly based on subjectively judgment. Thus it is inapplicable or unbelievable. To evaluate software maintainability objectively,the software configuration management( SCM) data are collected to establish a maintainability model. Based on the hidden Markov chain( HMC), a three-state maintainability estimation model is constructed. To validate the feasibility of the model,a real software example of software maintenance activity is given and the result from the example shows the effectiveness of the proposed method.展开更多
In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manus...In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manuscript unveils a revolutionary blueprint for cyber resilience, empowering organizations to transcend the limitations of traditional cybersecurity paradigms and forge ahead into uncharted territories of data security excellence and frictionless secrets management experience. Enter a new era of cybersecurity innovation and continued excellence. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the secrets lifecycle management with other platform cohesive integrations. Enterprises can enhance security, streamline operations, fasten development practices, avoid secrets sprawl, and improve overall compliance and DevSecOps practice. This enables the enterprises to enhance security, streamline operations, fasten development & deployment practices, avoid secrets spawls, and improve overall volume in shipping software with paved-road DevSecOps Practices, and improve developers’ productivity. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the application secrets lifecycle with other platform cohesive integrations. Organizations can enhance security, streamline operations, fasten development & deployment practices, avoid secrets sprawl, and improve overall volume in shipping software with paved-road DevSecOps practices. Most importantly, increases developer productivity.展开更多
Configuration management(CM)is an effective method for data modeling and change management in product development,but the study of how it can be adapted for complex product maintenance,repair and overhaul(MRO)has thus...Configuration management(CM)is an effective method for data modeling and change management in product development,but the study of how it can be adapted for complex product maintenance,repair and overhaul(MRO)has thus far been superficial.Research propositions are put forward on the basis of a literature review and verified by a case of a high-speed train MRO company.The findings show that CM can be used in MRO data management with adjustments in its functions.First,MRO-CM planning considers both multistage service and single-stage service to keep data consistent and continuous.Second,MRO data integration with the design/production phase should be considered during configuration identification.Third,baselines and change rules are developed for change control.Finally,status accounting and auditing can be repeatedly used in MRO data management.A systematic MRO-CM framework is generated to assist MRO practitioners in understanding the relationships among different MRO-CM functions.This paper contributes to expanding the theory of CM in MRO for complex products and provides an effective method for managing MRO data from systematic engineering insights.展开更多
Based on the key function of version management in PDM system, this paper discusses the function and the realization of version management and the transitions of version states with a workflow. A directed aeyclic grap...Based on the key function of version management in PDM system, this paper discusses the function and the realization of version management and the transitions of version states with a workflow. A directed aeyclic graph is used to describe a version model. Three storage modes of the directed acyelic graph version model in the database, the bumping block and the PDM working memory are presented and the conversion principle of these three modes is given. The study indicates that building a dynamic product structure configuration model based on versions is the key to resolve the problem. Thus a version model of single product object is built. Then the version management model in product structure configuration is built and the application of version management of PDM syster is presented as a case.展开更多
Most large-scale systems including self-adaptive systems utilize feature models(FMs)to represent their complex architectures and benefit from the reuse of commonalities and variability information.Self-adaptive system...Most large-scale systems including self-adaptive systems utilize feature models(FMs)to represent their complex architectures and benefit from the reuse of commonalities and variability information.Self-adaptive systems(SASs)are capable of reconfiguring themselves during the run time to satisfy the scenarios of the requisite contexts.However,reconfiguration of SASs corresponding to each adaptation of the system requires significant computational time and resources.The process of configuration reuse can be a better alternative to some contexts to reduce computational time,effort and error-prone.Nevertheless,systems’complexity can be reduced while the development process of systems by reusing elements or components.FMs are considered one of the new ways of reuse process that are able to introduce new opportunities for the reuse process beyond the conventional system components.While current FM-based modelling techniques represent,manage,and reuse elementary features to model SASs concepts,modeling and reusing configurations have not yet been considered.In this context,this study presents an extension to FMs by introducing and managing configuration features and their reuse process.Evaluation results demonstrate that reusing configuration features reduces the effort and time required by a reconfiguration process during the run time to meet the required scenario according to the current context.展开更多
The Web cluster has been a popular solution of network server system because of its scalability and cost effective ness. The cache configured in servers can result in increasing significantly performance, In this pape...The Web cluster has been a popular solution of network server system because of its scalability and cost effective ness. The cache configured in servers can result in increasing significantly performance, In this paper, we discuss the suitable configuration strategies for caching dynamic content by our experimental results. Considering the system itself can provide support for caching static Web page, such as computer memory cache and disk's own cache, we adopt a special pattern that only caches dynamic Web page in some experiments to enlarge cache space. The paper is introduced three different replacement algorithms in our cache proxy module to test the practical effects of caching dynamic pages under different conditions. The paper is chiefly analyzed the influences of generated time and accessed frequency on caching dynamic Web pages. The paper is also provided the detailed experiment results and main conclusions in the paper.展开更多
With the challenges brought by the expansion of network scale,as well as the diversity of the equipments and the complexity of network protocols,many self-configurable systems have been proposed combining formal speci...With the challenges brought by the expansion of network scale,as well as the diversity of the equipments and the complexity of network protocols,many self-configurable systems have been proposed combining formal specification and model finding techniques.In this paper,we pay more attention to formal specifications of network information,i.e.,exploring principles and algorithm to map network information(topology,devices and status,etc.) to Alloy specifications.We first model network information in relational form,which is easy to realize because of the structured feature of network information in nature.Then we map the relational data to Alloy specifications according to our novel data mapping principles and algorithm.Based on the transition of relational data,it is possible to automatically map network information to Alloy specifications.We evaluate our data mapping principles and algorithm by applying them to a practical application scenario.The results illustrate that we can find a model for the task within a tolerant time interval,which implies that our novel approach can convert relational data to Alloy specifications correctly and efficiently.展开更多
Some key techniques for the development of web-based product data management (PDM) system are introduced. The four-tiered B/S architecture of a PDM system-BITPDM is introduced first, followed by its design and imple...Some key techniques for the development of web-based product data management (PDM) system are introduced. The four-tiered B/S architecture of a PDM system-BITPDM is introduced first, followed by its design and implementation, including virtual data vault, flexible coding system, document management, product structure and configuration management, workflow/process and product maturity management. BITPDM can facilitate the activities from new product introduction phase to manufacturing, and manage the product data andtheir dynamic changing history. Based on Microsoft. NET, XML, web service and SOAP techniques, BITPDM realizes the integration and efficient management of product information.展开更多
An important area of focus in complex systems development is the capability to adapt to variable runtime environmental resources and to accommodate runtime system failures. The research in this area is broadly termed ...An important area of focus in complex systems development is the capability to adapt to variable runtime environmental resources and to accommodate runtime system failures. The research in this area is broadly termed as “Self Healing” and has recently aroused increasing attention to complex systems. Digital libraries have gained popularity because of the richer features they provide compared to traditional libraries. As more users begin to use digital libraries, addressing downtimes of these valuable resources has become a high priority. Operating and providing access to digital content to anyone, anytime from anywhere in the world, results in a continued rise of administrative overhead for system monitoring and needs continuous human intervention. Given the volume of information and the huge infrastructure of modem libraries, continuous manual system administration is quite costly and not feasible. In this paper we propose a self healing digital library system as the solution to this problem and present the approach of adding self healing capabilities to an existing digital library project, the Digital Library of India (DLI). We also propose a self healing framework that enables successful reuse of our approach to other architecturally similar digital library systems.展开更多
The main structure and key techniques of our Virtual Exhibition Software are summarized. It demonstrates the practice of Software Engineering during the development of our project and discusses the use of UML in it.
The TMN (telecommunications management network) project was started by the ITU T in the fall of 1985. And with the development of the TMN technologies, more and more TMN based networks have been developed. In this pa...The TMN (telecommunications management network) project was started by the ITU T in the fall of 1985. And with the development of the TMN technologies, more and more TMN based networks have been developed. In this paper we study and analyze the application of TMN to intelligent networks from the view of configuration management function, design the TMN based network configuration management system under UNIX environment in intelligent networks, and use the GDMO to describe the information model of the system in the design.展开更多
基金the National High Technology Research and Development Program of China (2007AA01Z412)
文摘It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform.
基金supported by the National Natural Science Foundation of China(Grant Number:61672080,Sponsored Authors:Yang S.,Sponsors’Websites:http://www.nsfc.gov.cn/english/site_1/index.html).
文摘The rapid growth in software demand incentivizes software development organizations to develop exclusive software for their customers worldwide.This problem is addressed by the software development industry by software product line(SPL)practices that employ feature models.However,optimal feature selection based on user requirements is a challenging task.Thus,there is a requirement to resolve the challenges of software development,to increase satisfaction and maintain high product quality,for massive customer needs within limited resources.In this work,we propose a recommender system for the development team and clients to increase productivity and quality by utilizing historical information and prior experiences of similar developers and clients.The proposed system recommends features with their estimated cost concerning new software requirements,from all over the globe according to similar developers’and clients’needs and preferences.The system guides and facilitates the development team by suggesting a list of features,code snippets,libraries,cheat sheets of programming languages,and coding references from a cloud-based knowledge management repository.Similarly,a list of features is suggested to the client according to their needs and preferences.The experimental results revealed that the proposed recommender system is feasible and effective,providing better recommendations to developers and clients.It provides proper and reasonably well-estimated costs to perform development tasks effectively as well as increase the client’s satisfaction level.The results indicate that there is an increase in productivity,performance,and quality of products and a reduction in effort,complexity,and system failure.Therefore,our proposed system facilitates developers and clients during development by providing better recommendations in terms of solutions and anticipated costs.Thus,the increase in productivity and satisfaction level maximizes the benefits and usability of SPL in the modern era of technology.
基金Project supported by the Hi-Tech Research and Development Program (863) of China (No. 2002AA1Z2306) and HP Embedded Laboratory of Zhejiang University, China
文摘Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol configuration also encounters those problems. This paper focuses on solving protocol component versioning issues for protocol configuration man- agement on embedded system, incorporating the following versioning issues: version identification, version description and protocol component archiving and retrieving based on the version library.
基金Supported by the National High-Tech. R&D Program for CIMS China (Grant No. 2001AA412180)
文摘An enhanced system architecture of Web-based product structure and configuration management system along with its, functions are is presented. The key techniques, such as construction of object models of product structure and product configuration, hybrid approach method in product configuration management, sharing and integration of heterogeneous product data, integration with other sub-systems, are discussed too. A prototype system is developed by J2EE technology.
文摘As one of the most important attributes of software quality, software maintainability has been widely recognized.However,the existing maintainability evaluation methods are mostly based on subjectively judgment. Thus it is inapplicable or unbelievable. To evaluate software maintainability objectively,the software configuration management( SCM) data are collected to establish a maintainability model. Based on the hidden Markov chain( HMC), a three-state maintainability estimation model is constructed. To validate the feasibility of the model,a real software example of software maintenance activity is given and the result from the example shows the effectiveness of the proposed method.
文摘In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manuscript unveils a revolutionary blueprint for cyber resilience, empowering organizations to transcend the limitations of traditional cybersecurity paradigms and forge ahead into uncharted territories of data security excellence and frictionless secrets management experience. Enter a new era of cybersecurity innovation and continued excellence. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the secrets lifecycle management with other platform cohesive integrations. Enterprises can enhance security, streamline operations, fasten development practices, avoid secrets sprawl, and improve overall compliance and DevSecOps practice. This enables the enterprises to enhance security, streamline operations, fasten development & deployment practices, avoid secrets spawls, and improve overall volume in shipping software with paved-road DevSecOps Practices, and improve developers’ productivity. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the application secrets lifecycle with other platform cohesive integrations. Organizations can enhance security, streamline operations, fasten development & deployment practices, avoid secrets sprawl, and improve overall volume in shipping software with paved-road DevSecOps practices. Most importantly, increases developer productivity.
基金provided by the China Scholarship Council(CSC)under Grant No.201806060035the Open Fund of Key Laboratory of Anhui Higher Education Institutes under Grant No.CS2021-03+1 种基金the Key Project of University Humanities and Social Science Research in Anhui Province under Grant No.SK2020A0173the Research Fund for Young Teachers of Anhui University of Technology under Grant No.QS202014 are acknowledged.
文摘Configuration management(CM)is an effective method for data modeling and change management in product development,but the study of how it can be adapted for complex product maintenance,repair and overhaul(MRO)has thus far been superficial.Research propositions are put forward on the basis of a literature review and verified by a case of a high-speed train MRO company.The findings show that CM can be used in MRO data management with adjustments in its functions.First,MRO-CM planning considers both multistage service and single-stage service to keep data consistent and continuous.Second,MRO data integration with the design/production phase should be considered during configuration identification.Third,baselines and change rules are developed for change control.Finally,status accounting and auditing can be repeatedly used in MRO data management.A systematic MRO-CM framework is generated to assist MRO practitioners in understanding the relationships among different MRO-CM functions.This paper contributes to expanding the theory of CM in MRO for complex products and provides an effective method for managing MRO data from systematic engineering insights.
基金the Scientific Technology Development Project of Heilongjiang(Grant No.WH05A01 and GB05A103)Scientific Technology Development Project of Harbin
文摘Based on the key function of version management in PDM system, this paper discusses the function and the realization of version management and the transitions of version states with a workflow. A directed aeyclic graph is used to describe a version model. Three storage modes of the directed acyelic graph version model in the database, the bumping block and the PDM working memory are presented and the conversion principle of these three modes is given. The study indicates that building a dynamic product structure configuration model based on versions is the key to resolve the problem. Thus a version model of single product object is built. Then the version management model in product structure configuration is built and the application of version management of PDM syster is presented as a case.
文摘Most large-scale systems including self-adaptive systems utilize feature models(FMs)to represent their complex architectures and benefit from the reuse of commonalities and variability information.Self-adaptive systems(SASs)are capable of reconfiguring themselves during the run time to satisfy the scenarios of the requisite contexts.However,reconfiguration of SASs corresponding to each adaptation of the system requires significant computational time and resources.The process of configuration reuse can be a better alternative to some contexts to reduce computational time,effort and error-prone.Nevertheless,systems’complexity can be reduced while the development process of systems by reusing elements or components.FMs are considered one of the new ways of reuse process that are able to introduce new opportunities for the reuse process beyond the conventional system components.While current FM-based modelling techniques represent,manage,and reuse elementary features to model SASs concepts,modeling and reusing configurations have not yet been considered.In this context,this study presents an extension to FMs by introducing and managing configuration features and their reuse process.Evaluation results demonstrate that reusing configuration features reduces the effort and time required by a reconfiguration process during the run time to meet the required scenario according to the current context.
基金Supported by the National Natural Science Foun-dation of China (90204008)
文摘The Web cluster has been a popular solution of network server system because of its scalability and cost effective ness. The cache configured in servers can result in increasing significantly performance, In this paper, we discuss the suitable configuration strategies for caching dynamic content by our experimental results. Considering the system itself can provide support for caching static Web page, such as computer memory cache and disk's own cache, we adopt a special pattern that only caches dynamic Web page in some experiments to enlarge cache space. The paper is introduced three different replacement algorithms in our cache proxy module to test the practical effects of caching dynamic pages under different conditions. The paper is chiefly analyzed the influences of generated time and accessed frequency on caching dynamic Web pages. The paper is also provided the detailed experiment results and main conclusions in the paper.
基金supported by the National Science Foundation for Distinguished Young Scholars of China under Grant No.61225012 and No.71325002the Specialized Research Fund of the Doctoral Program of Higher Education for the Priority Development Areas under Grant No.20120042130003the Liaoning BaiQianWan Talents Program under Grant No.2013921068
文摘With the challenges brought by the expansion of network scale,as well as the diversity of the equipments and the complexity of network protocols,many self-configurable systems have been proposed combining formal specification and model finding techniques.In this paper,we pay more attention to formal specifications of network information,i.e.,exploring principles and algorithm to map network information(topology,devices and status,etc.) to Alloy specifications.We first model network information in relational form,which is easy to realize because of the structured feature of network information in nature.Then we map the relational data to Alloy specifications according to our novel data mapping principles and algorithm.Based on the transition of relational data,it is possible to automatically map network information to Alloy specifications.We evaluate our data mapping principles and algorithm by applying them to a practical application scenario.The results illustrate that we can find a model for the task within a tolerant time interval,which implies that our novel approach can convert relational data to Alloy specifications correctly and efficiently.
文摘Some key techniques for the development of web-based product data management (PDM) system are introduced. The four-tiered B/S architecture of a PDM system-BITPDM is introduced first, followed by its design and implementation, including virtual data vault, flexible coding system, document management, product structure and configuration management, workflow/process and product maturity management. BITPDM can facilitate the activities from new product introduction phase to manufacturing, and manage the product data andtheir dynamic changing history. Based on Microsoft. NET, XML, web service and SOAP techniques, BITPDM realizes the integration and efficient management of product information.
文摘An important area of focus in complex systems development is the capability to adapt to variable runtime environmental resources and to accommodate runtime system failures. The research in this area is broadly termed as “Self Healing” and has recently aroused increasing attention to complex systems. Digital libraries have gained popularity because of the richer features they provide compared to traditional libraries. As more users begin to use digital libraries, addressing downtimes of these valuable resources has become a high priority. Operating and providing access to digital content to anyone, anytime from anywhere in the world, results in a continued rise of administrative overhead for system monitoring and needs continuous human intervention. Given the volume of information and the huge infrastructure of modem libraries, continuous manual system administration is quite costly and not feasible. In this paper we propose a self healing digital library system as the solution to this problem and present the approach of adding self healing capabilities to an existing digital library project, the Digital Library of India (DLI). We also propose a self healing framework that enables successful reuse of our approach to other architecturally similar digital library systems.
文摘The main structure and key techniques of our Virtual Exhibition Software are summarized. It demonstrates the practice of Software Engineering during the development of our project and discusses the use of UML in it.
文摘The TMN (telecommunications management network) project was started by the ITU T in the fall of 1985. And with the development of the TMN technologies, more and more TMN based networks have been developed. In this paper we study and analyze the application of TMN to intelligent networks from the view of configuration management function, design the TMN based network configuration management system under UNIX environment in intelligent networks, and use the GDMO to describe the information model of the system in the design.