• Title/Summary/Keyword: 핵심자산 특화

Search Result 5, Processing Time 0.021 seconds

A Core Asset Instantiation Process using Variability Type in Product line Engineering (가변성 타입을 이용한 프로덕트 라인 핵심자산 특화 프로세스)

  • Kang, Hyun-Koo;Chang, Soo-Ho;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.2
    • /
    • pp.154-166
    • /
    • 2006
  • Product Line Engineering(PLE) is a software reuse paradigm that core assets are defined using common features in a domain and are instantiated in various applications. To apply the core asset effectively, variants which satisfy application requirements are extracted and the core asset should be also instantiated based on the variants. For the work, variability on architecture and components should be extracted exactly and an instantiation process and guidelines should be defined based on this variability In this paper, we define variability types depending on core assets elements and describe artifact templates related to tile variability. We also propose a systematic process which uses defined core assets including variability and verify practicability of the proposed process and variability expression through doing ease study. If utilizing with the proposed process in PLE, it can be feasible to model concrete core asset and variability and to utilize practical application engineering.

A Specification Technique for Product Line Core Assets using MDA / PIM (MDA / PIM을 이용한 제품계열 핵심자산의 명세 기법)

  • Min, Hyun-Gi;Han, Man-Jib;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.9
    • /
    • pp.835-846
    • /
    • 2005
  • A Product Line (PL) is a set of products (applications) that share common assets in a domain. Product Line Engineering (PLE) is a set of principles, techniques, mechanisms, and processes that enables the instantiation of produce lines. Core assets, the common assets, are created and instantiated to make products in PLE. Model Driven Architecture (MDA) is a new software development paradigm that emphasizes its feasibility with automatically developing product. Therefore, we can get advantages of both of the two paradigms, PLE and MDA, if core assets are represented as PIM in MDA with predefined automatic mechanism. PLE framework in the PIM level has to be interpreted by MDA tools. However, we do not have a standard UML profile for representing core assets. The research about representing PLE framework is not enough to make automatically core assets and products. We represent core asset in PIM level in terms of structural view and semantic view. We also suggest a method for representing architecture, component, workflow, algorithm, and decision model. The method of representing framework with PLE and MDA is used to improve productivity, applicability, maintainability and qualify of product.

Key Elements of Generic Architecture in PLE Core Assets (제품계열공학 핵심자산의 범용 아키텍처 구성요소)

  • 라현정;장수호;김수동
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.319-321
    • /
    • 2004
  • 제품 계열 공학(Product Line Engineering, PLE)는 패밀리 멤버들의 공통성과 가변성을 분석하여 만든 핵심 자산을 특화시켜 어플리케이션을 개발함으로써 재사용성과 이용가능성을 증대시키는 접근 방법이다. 핵심 자산은 제품 계열에 속하는 패밀리 멤버들이 어플리케이션을 만드는데 기초가 되는 모든 자산을 포함하며, 아키텍처, 컴포넌트 둥이 포함될 수 있다. 범용 아키텍처는 패밀리 멤버들이 공통적으로 사용할 수 있는 아키텍처로, 제품 계열에 속하는 제품들의 구조를 정의하고 컴포넌트의 인터페이스 명세를 제공하여 컴포넌트만큼 중요한 재사용 단위이다. 본 논문에서는 대표적인 PLE 방법론에서 정의한 제품 계열 아키텍처와 일반 소프트웨어 아키텍처를 비교하여 범용 아키텍처에 포함되는 요소들을 선정하고, 메타 모델을 이용하여 범용 아키텍처 구성요소와 구성요소간 관계를 명확히 정의함으로써, 개념적인 아키텍처를 보다 실용적으로 설계하는데 도움이 되게 하고자 한다.

  • PDF

A Study on Classification of Information Asset Considering Business Process Characteristics for Small IT Service Organization (소규모 IT 서비스 기업 비즈니스 특성을 고려한 정보자산 유형분류 설계연구)

  • Kang, Jong-Gu;Lim, Jae-Hwan;Lee, Hong-Joo;Chang, Hang-Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.97-108
    • /
    • 2011
  • Small IT service organizations operate their business with limited resources and workforce in comparison with large enterprises, and they could be categorized in various types based on the method of value creation. But the recent studies on information security have been conducted and they were focused on the construction of general information security countermeasure, without considering size of the business and characteristic. Hence we have undergone the process of classifying information assets. Then we extracted and categorized the information assets considering characteristics of small organization's size and business process. Specifically we have classified the information assets according to business scenario design through qualitative observation method. Then we have validated the classified information assets by utilizing statistical method. We may anticipate that this study results could be basic data for developing the differentiated information security countermeasures for small IT service organization.

A Study on DSMS Framework for Data Security Certification (데이터보안인증을 위한 DSMS 프레임워크 구축 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.107-113
    • /
    • 2019
  • Data security is the planning, implementation and implementation of security policies and procedures for the proper audit and authorization of access to and use of data and information assets. In addition, data serviced through internal / external networks, servers, applications, etc. are the core objects of information protection and can be said to focus on the protection of data stored in DB and DB in the category of information security of database and data. This study is a preliminary study to design a proper Data Security Management System (DSMS) model based on the data security certification system and the US Federal Security Management Act (FISMA). And we study the major security certification systems such as ISO27001 and NIST's Cybersecurity Framework, and also study the state of implementation in the data security manager solution that is currently implemented as a security platform for preventing personal data leakage and strengthening corporate security.