Time filter

Source Type

Fleischer J.,German Research Center for Geosciences | Haner R.,German Research Center for Geosciences | Herrnkind S.,German Research Center for Geosciences | Kloth A.,SpaceTech GmbH STI | And 3 more authors.
Natural Hazards and Earth System Science | Year: 2010

The German Indonesian Tsunami Early Warning System (GITEWS) is built upon a complex sensor data infrastructure. To best fulfill the demand for a long living system, the underlying software and hardware architecture of GITEWS must be prepared for future modifications both of single sensors and entire sensors systems. The foundation for a flexible integration and for stable interfaces is a result of following the paradigm of a Service Oriented Architecture (SOA). The Tsunami Service Bus (TSB) - our integration platform in GITEWS - realizes this SOA approach by implementing the Sensor Web Enablement (SWE) standards and services. This paper focuses on architectural and implementation aspects of the TSB. Initially, the general architectural approach in GITEWS by SOA and SWE is presented. Based on this conception, the concrete system architecture of GITEWS is introduced. The sensor integration platform TSB is then discussed in detail, following by its primary responsibilities and components. Special emphasis is laid on architectural transparency, comprehensible design decisions, and references to the applied technology. © Author(s) 2010. Source

Voisard A.,Free University of Berlin | Voisard A.,Fraunhofer Institute for Software and Systems Engineering ISST | Ziekow H.,Humboldt University of Berlin
Information Systems | Year: 2011

In the past decade, event-based systems (EBS) have received increasing attention from various communities. Central to these systems is the notion of event, which is often generally considered as a happening of interest. An EBS encompasses a large range of functionalities on various technological levels (e.g., language, execution, or communication). Existing approaches vary in the scope of implemented functionality and underlying technical concepts. For this reason, comparing EBS solutions is a challenging task. Furthermore, the lack of a unified view on EBS poses challenges to system architects in choosing and combining technologies for building event-based systems. This paper presents ARCHITECT, a framework that decomposes a general EBS into layers of abstraction. The goal of the proposed framework is twofold: (1) provide concepts that aid the understanding of existing technologies and solutions for EBS as well as their relations from a software engineering point of view; (2) present a layered framework, which enables classifying technologies for EBS and supports system architects in building complex systems from specialized components. We believe that the concepts presented in this paper are likely to improve the way both researchers and practitioners understand, use, and develop EBS components as well as complete systems. © 2011 Elsevier B.V. Source

Jurjens J.,TU Dortmund | Jurjens J.,Fraunhofer Institute for Software and Systems Engineering ISST | Ahmadian A.S.,TU Dortmund
MODELSWARD 2015 - 3rd International Conference on Model-Driven Engineering and Software Development, Proceedings | Year: 2015

In this invited presentation, we give an overview on a soundly based approach to Secure Software Engineering based on the UML extension UMLsec. More specifically, one main current focus is the automated, formally based analysis of software artefacts against security requirements. This is motivated by the observation that the current state of security engineering in practice is far from satisfactory. The goal is thus to start with the actual industrial engineering methods of security-critical software-based systems, to identify problems which are practically amenable to tool-supported, formally sound analysis methods, and to try to solve these problems using these methods. An important objective is to ensure that these analysis methods can actually be used in practice by keeping the additional overhead in using them bounded: First, they take as input artefacts which are already available in current industrial software development (such as UML models and program source code) and do not have to be constructed just to perform the analysis. Second, the tools should be reasonably easy to use and have a strong emphasis on automation. We also present results from some recent work on applying model-based security analysis to the analysis of economic aspects of securing critical infrastructures. Copyright © 2015 SCITEPRESS - Science and Technology Publications. Source

Ahmadian A.S.,University of Koblenz-Landau | Coerschulte F.,University of Koblenz-Landau | Jurjens J.,University of Koblenz-Landau | Jurjens J.,Fraunhofer Institute for Software and Systems Engineering ISST
Lecture Notes in Business Information Processing | Year: 2016

Outsourcing services into the cloud is a worthwhile alternative to classic service models from both a customers and providers point of view. Therefore many new cloud providers surface, offering their cloud solutions. The trust and acceptance for cloud solutions are however still not given for many customers since a lot of security incidents related to cloud computing were reported. One possibility for companies to raise the trust in the own products is to gain a certification for them based on ISO27001. The certification is however a large hurdle, especially for small and medium enterprises since they lack resources and know-how. In this paper we present an overview of the ClouDAT framework. It represents a tool based approach to help in the certification process for cloud services specifically tailored to SMEs. © Springer International Publishing Switzerland 2016. Source

Meister S.,Fraunhofer Institute for Software and Systems Engineering ISST
Lecture Notes in Business Information Processing | Year: 2012

Today's central issues in the healthcare supply make it imperative to develop new concepts to reduce the emerging costs and ensure high quality standards. Applying ICT and especially telemedicine - technologies that offer the chance to optimize medical data transfer - is regarded as the promising strategy, when developing cost saving concepts. As a result, physicians, as recipients of medical data, are confronted with a growing amount of information. This has to fit seamlessly into the process of information exchange and therefore has to be transported according to the principles of information logistics (ILOG). Therefore the author proposes a new approach based upon complex event processing (CEP), named Telemedical ILOG Listener (TIL). Every telemedical value, like for instance blood-pressure, has to be described as a telemedical event. For this reason in the following the author will describe how to use HL7 V3, a worldwide used standard for medical data exchange, to define a message type which is able to include the medical data, data necessary for CEP and at least data to represent the dimension of ILOG. © 2012 Springer-Verlag Berlin Heidelberg. Source

Discover hidden collaborations