Search : [ keyword: 품질 속성 ] (3)

Design and Implementation of Framework Based Emulator Considering Expansion of MIDS LVT Platform

Sangtae Lee, Jongseo Kim, Sounghyouk Wi, Taegwon Lee, Seungbae Jee, Seungchan Lee

http://doi.org/10.5626/JOK.2021.48.1.61

MIDS LVT is communication equipment mounted with Link-16-based weapon systems to provide the Link-16 operating environment between weapon systems. Currently, the military operates the MIDS LVT BU1, but it will be changed to the BU2 and JTRS according to the performance improvement. The communication interface, message data format, and message composition of the MIDS LVT are different depending on the platform family (BU1/BU2/JTRS) and type (A,D,J). In this paper, we propose a framework based emulator design and implementation method that considers the MIDS LVT platform extension to improve these problems. In consideration of the quality attributes of the sw architecture, we designed a common based framework for modifiability, reusability, and extensibility. The MIDS LVT emulator comprises the MIDS LVT emulator processing, link interface processing, and monitoring tool. The MIDS LVT emulator was implemented by deriving and improving functions through the analysis of the functions of the previously developed overseas tools. Through the development of the MIDS LVT emulator, it can be used to develop and verify the developed Link-16 host system.

Ontology-based Approach to Determine the Conflicts between Security and Usability Requirements in the Requirements Engineering Process

Woori Roh, Seok-Won Lee

http://doi.org/10.5626/JOK.2018.45.11.1142

Considering the trade-offs or conflicts between security and usability during the requirements engineering (RE) process is a complicated task. This is due to the contrary characteristics of security and usability as well as a lack of research on finding a consensus on the semantics of quality attributes, especially for security and usability. Furthermore, the number of security experts available is decreasing, while a methodology to determine the conflicts between security and usability during the RE process has not yet been developed. We, therefore, propose a novel approach to construct a three-layer ontological knowledge base by linking the keywords from definitions, criteria, and metrics of security and usability. In addition, we discuss the applicability of this knowledge base by examining two case studies with software engineering (SE) students. These case studies show that the participants using the proposed approach (Team A) can derive conflicts that are more precise compared to the participants who did not use the knowledge base (Team B). Moreover, the number of conflicts derived by Team A is half that by Team B. Regardless of the knowledge level, the proposed approach can determine the conflicts between security and usability during the RE process. Also, while practical RE studies have often been considered difficult to handle, the proposed approach can show the applicability of RE research.

An Architectural Pattern Recommendation Method Based on a Quality-Attributes Trade-off Analysis

Hyeon-ju Park, Seok-Won Lee

http://doi.org/

Recently, the accomplishment of a system’s quality attributes requires the negotiation of increasingly complex requirements, and this is because the contextual and developmental environments in which software is used has undergone broad changes. Nevertheless, with regard to most architectural designs, many of the proportions depend on the architect’s intuition. Moreover, even if reusable architectural patterns are adapted to an architectural design, common schemas for the description of their use are nonexistent, and it is difficult to make a comparison for the selection of an appropriate systemic pattern because the focus of the schemas is not the user’s perspective. To achieve a fast initial-design decision, this paper suggests new schemas that reduce the distance between the quality attribute requirements and the design by reinterpreting architectural patterns from the user’s perspective. Also, based on the reconstructed pattern model that is derived from the use of the new schemas, an architectural-pattern recommendation method (APOQATo) for which the trade-off and the constraints that are due to the design decision are considered is provided as well as the advantages of the architectural pattern for which the quality attributes are satisfied.


Search




Journal of KIISE

  • ISSN : 2383-630X(Print)
  • ISSN : 2383-6296(Electronic)
  • KCI Accredited Journal

Editorial Office

  • Tel. +82-2-588-9240
  • Fax. +82-2-521-1352
  • E-mail. chwoo@kiise.or.kr