Coverart for item
The Resource Engineering adaptive software systems : Communications of NII Shonan Meetings, Yijun Yu, Arosha Bandara, Shinichi Honiden, Zhenjiang Hu, Tetsuo Tamai, Hausi Muller, John Mylopoulos, Bashar Nuseibeh, editors

Engineering adaptive software systems : Communications of NII Shonan Meetings, Yijun Yu, Arosha Bandara, Shinichi Honiden, Zhenjiang Hu, Tetsuo Tamai, Hausi Muller, John Mylopoulos, Bashar Nuseibeh, editors

Label
Engineering adaptive software systems : Communications of NII Shonan Meetings
Title
Engineering adaptive software systems
Title remainder
Communications of NII Shonan Meetings
Statement of responsibility
Yijun Yu, Arosha Bandara, Shinichi Honiden, Zhenjiang Hu, Tetsuo Tamai, Hausi Muller, John Mylopoulos, Bashar Nuseibeh, editors
Contributor
Editor
Subject
Genre
Language
eng
Cataloging source
GW5XE
Dewey number
005.3
Illustrations
illustrations
Index
no index present
LC call number
QA76.76.S375
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorDate
1966-
http://library.link/vocab/relatedWorkOrContributorName
  • Yu, Yijun
  • Bandara, Arosha K.
  • Honiden, Shinichi
  • Hu, Zhenjiang
  • Tamai, Tetsuo
  • Müller, Hausi A.
  • Mylopoulos, John
  • Nuseibeh, Bashar
http://library.link/vocab/subjectName
Self-adaptive software
Label
Engineering adaptive software systems : Communications of NII Shonan Meetings, Yijun Yu, Arosha Bandara, Shinichi Honiden, Zhenjiang Hu, Tetsuo Tamai, Hausi Muller, John Mylopoulos, Bashar Nuseibeh, editors
Instantiates
Publication
Antecedent source
unknown
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; References; Contents; 1 Design and Engineering of Adaptive Software Systems; 1.1 Introduction; 1.2 Designing Adaptive Software Systems; 1.2.1 Design Space for Self-Adaptive Systems; 1.2.2 Design of Adaptive Services; 1.2.2.1 A Modeling Framework for Adaptive Service Composition; 1.2.2.2 Adaptive Service Composition Process; 1.2.3 Human Factors; 1.2.3.1 Human as Expert; 1.2.3.2 Human as User; 1.2.3.3 Human as Agent; 1.2.3.4 Human as Component; 1.3 Engineering Adaptive Software Systems; 1.3.1 Model Management in Adaptive Software Systems; 1.3.1.1 Model Management
  • 1.3.1.2 Model Management for Implementing MAPE Loops1.3.1.3 Bidirectional Model Transformations for Adaptive Software Systems; 1.3.2 Adaptation for Evolving Software Systems; 1.3.2.1 From Natural Selection to Self-Adaptation; 1.3.2.2 Future-Proof by Core Architectures; 1.3.2.3 Future-Proof Requirements; 1.3.2.4 Composition Requirements for Encapsulating Future Changes; 1.3.2.5 Evolving Component-Based Systems: Addressing the Meaningful Changes; 1.3.2.6 Example: Meeting Scheduler; 1.3.2.7 Back to the Future; 1.4 Conclusion; References
  • 2 Self-Adaptation of Software Using Automatically Generated Control-Theoretical Solutions2.1 Introduction; 2.2 Background; 2.3 Automated Control-Theoretical Software Adaptation; 2.3.1 Automation of Control System Development; 2.3.1.1 Brownout; 2.3.1.2 Push-Button Methodology; 2.3.2 Adaptation with Goal Prioritization; 2.3.3 Adaptation with Guaranteed Optimality; 2.3.4 Adaptation with New and Changing Goals; 2.3.5 Automated Model Predictive Control; 2.4 Challenges; 2.5 Conclusions; References; 3 Challenges in Engineering Self-Adaptive Authorisation Infrastructures; 3.1 Introduction
  • 3.2 Background3.2.1 Access Control Models; 3.2.2 Implementing Access Control Models; 3.2.3 Authorisation Infrastructures; 3.2.4 Static and Dynamic Access Control; 3.2.5 Self-Adaptive Authorisation Infrastructures; 3.2.5.1 Self-Adaptation; 3.2.5.2 Self-Adaptive Authorisation and Self-Adaptive Access Control; 3.2.5.3 Self-Protection; 3.2.6 Insider Threats; 3.3 Related Work; 3.4 Challenges in Engineering Self-Adaptive Authorisation Infrastructures; 3.4.1 Monitor; 3.4.1.1 Active Monitoring; 3.4.1.2 Run-Time Synthesis of Probes and Gauges; 3.4.1.3 Mutating Gauges; 3.4.1.4 Incomplete Information
  • 3.4.1.5 Automatic Feature Identification3.4.2 Analyse; 3.4.2.1 Anomaly Detection; 3.4.2.2 Signature-Based Detection; 3.4.2.3 Case-Based Detection; 3.4.2.4 Diagnosis; 3.4.2.5 Resuming Normality; 3.4.2.6 Perpetual Evaluation; 3.4.2.7 Threat Management; 3.4.2.8 Risk Analysis; 3.4.3 Plan; 3.4.3.1 Decision-Making in a Federated Authorisation Infrastructure; 3.4.3.2 Randomising Decisions; 3.4.3.3 Denial of Service; 3.4.3.4 Robust Plans; 3.4.3.5 Controller Capabilities; 3.4.3.6 Infrastructure Boundary; 3.4.4 Execute; 3.4.4.1 Run-Time Synthesis of Effectors
Dimensions
unknown
Extent
1 online resource (vii, 169 pages)
File format
unknown
Form of item
online
Isbn
9789811321856
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-981-13-2185-6
Other physical details
illustrations (some color)
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
  • on1083263753
  • (OCoLC)1083263753
Label
Engineering adaptive software systems : Communications of NII Shonan Meetings, Yijun Yu, Arosha Bandara, Shinichi Honiden, Zhenjiang Hu, Tetsuo Tamai, Hausi Muller, John Mylopoulos, Bashar Nuseibeh, editors
Publication
Antecedent source
unknown
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; References; Contents; 1 Design and Engineering of Adaptive Software Systems; 1.1 Introduction; 1.2 Designing Adaptive Software Systems; 1.2.1 Design Space for Self-Adaptive Systems; 1.2.2 Design of Adaptive Services; 1.2.2.1 A Modeling Framework for Adaptive Service Composition; 1.2.2.2 Adaptive Service Composition Process; 1.2.3 Human Factors; 1.2.3.1 Human as Expert; 1.2.3.2 Human as User; 1.2.3.3 Human as Agent; 1.2.3.4 Human as Component; 1.3 Engineering Adaptive Software Systems; 1.3.1 Model Management in Adaptive Software Systems; 1.3.1.1 Model Management
  • 1.3.1.2 Model Management for Implementing MAPE Loops1.3.1.3 Bidirectional Model Transformations for Adaptive Software Systems; 1.3.2 Adaptation for Evolving Software Systems; 1.3.2.1 From Natural Selection to Self-Adaptation; 1.3.2.2 Future-Proof by Core Architectures; 1.3.2.3 Future-Proof Requirements; 1.3.2.4 Composition Requirements for Encapsulating Future Changes; 1.3.2.5 Evolving Component-Based Systems: Addressing the Meaningful Changes; 1.3.2.6 Example: Meeting Scheduler; 1.3.2.7 Back to the Future; 1.4 Conclusion; References
  • 2 Self-Adaptation of Software Using Automatically Generated Control-Theoretical Solutions2.1 Introduction; 2.2 Background; 2.3 Automated Control-Theoretical Software Adaptation; 2.3.1 Automation of Control System Development; 2.3.1.1 Brownout; 2.3.1.2 Push-Button Methodology; 2.3.2 Adaptation with Goal Prioritization; 2.3.3 Adaptation with Guaranteed Optimality; 2.3.4 Adaptation with New and Changing Goals; 2.3.5 Automated Model Predictive Control; 2.4 Challenges; 2.5 Conclusions; References; 3 Challenges in Engineering Self-Adaptive Authorisation Infrastructures; 3.1 Introduction
  • 3.2 Background3.2.1 Access Control Models; 3.2.2 Implementing Access Control Models; 3.2.3 Authorisation Infrastructures; 3.2.4 Static and Dynamic Access Control; 3.2.5 Self-Adaptive Authorisation Infrastructures; 3.2.5.1 Self-Adaptation; 3.2.5.2 Self-Adaptive Authorisation and Self-Adaptive Access Control; 3.2.5.3 Self-Protection; 3.2.6 Insider Threats; 3.3 Related Work; 3.4 Challenges in Engineering Self-Adaptive Authorisation Infrastructures; 3.4.1 Monitor; 3.4.1.1 Active Monitoring; 3.4.1.2 Run-Time Synthesis of Probes and Gauges; 3.4.1.3 Mutating Gauges; 3.4.1.4 Incomplete Information
  • 3.4.1.5 Automatic Feature Identification3.4.2 Analyse; 3.4.2.1 Anomaly Detection; 3.4.2.2 Signature-Based Detection; 3.4.2.3 Case-Based Detection; 3.4.2.4 Diagnosis; 3.4.2.5 Resuming Normality; 3.4.2.6 Perpetual Evaluation; 3.4.2.7 Threat Management; 3.4.2.8 Risk Analysis; 3.4.3 Plan; 3.4.3.1 Decision-Making in a Federated Authorisation Infrastructure; 3.4.3.2 Randomising Decisions; 3.4.3.3 Denial of Service; 3.4.3.4 Robust Plans; 3.4.3.5 Controller Capabilities; 3.4.3.6 Infrastructure Boundary; 3.4.4 Execute; 3.4.4.1 Run-Time Synthesis of Effectors
Dimensions
unknown
Extent
1 online resource (vii, 169 pages)
File format
unknown
Form of item
online
Isbn
9789811321856
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-981-13-2185-6
Other physical details
illustrations (some color)
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
  • on1083263753
  • (OCoLC)1083263753

Library Locations

Processing Feedback ...