Examinando por Materia "Domain"
Mostrando 1 - 3 de 3
Resultados por página
Opciones de ordenación
Ítem 2D simulation flue implementing the lattice-boltzmann method(TRANS TECH PUBLICATIONS LTD, 2014-01-01) Ruiz, D.B.; Mesa, A.A.; Alvis, R.G.; Universidad EAFIT. Departamento de Ingeniería de Sistemas; I+D+I en Tecnologías de la Información y las ComunicacionesCurrently in the process of engineering, but increasingly implemented simulation methods since they are an economical and feasible to predict the behavior of some variable you wish to benefit. The problem of fluid simulation is a broad field of study, traditionally in this area are implemented domain discretization methods, volumes, differences or finite elements (Computational Fluid Dynamics), in this work, a different approach where the discretization is made on the physical properties of fluid and the fluid for reconstruction from its microscopic properties, simulating these, propagating Boltzmann distribution functions for the grid of nodes, this set is comprised of a fluid group of nodes, nodes fluid the border and nodes structure, docked the method to the boundary conditions necessary to simulate Glycerol in a pipe. © (2014) Trans Tech Publications, Switzerland.Ítem A domain-specific modeling framework for attack surface modeling(SciTePress, 2020-01-01) Sun, T.N.; Drouot, B.; Golra, F.R.; Champeau, J.; Guerin, S.; Le Roux, L.; Mazo, R.; Teodorov, C.; Van Aertryck, L.; L'Hostis, B.; Universidad EAFIT. Departamento de Ingeniería de Sistemas; I+D+I en Tecnologías de la Información y las ComunicacionesCybersecurity is becoming vital as industries are gradually moving from automating physical processes to a higher level automation using cyber physical systems (CPS) and internet of things (IoT). In this context, security is becoming a continuous process that runs in parallel to other processes during the complete life cycle of a system. Traditional threat analysis methods use design models alongside threat models as an input for security analysis, hence missing the life-cycle-based dynamicity required by the security concern. In this paper, we argue for an attacker-aware systems modeling language that exposes the systems attack surfaces. For this purpose, we have designed Pimca, a domain specific modeling language geared towards capturing the attacker point of view of the system. This study introduces the formalism along with the Pimca workbench, a framework designed to ease the development and manipulation of the Pimca models. Finally, we present two relevant use cases, serving as a preliminary validation of our approach. © Copyright 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.Ítem Using the AMAN-DA method to generate security requirements: a case study in the maritime domain(London : Springer-Verlag, 2018-11-01) Souag A.; Mazo R.; Salinesi C.; Comyn-Wattiau I.; Souag A.; Mazo R.; Salinesi C.; Comyn-Wattiau I.; Universidad EAFIT. Departamento de Ingeniería de Sistemas; I+D+I en Tecnologías de la Información y las ComunicacionesSecurity requirements are known to be “the most difficult of requirements types” and potentially the ones causing the greatest risk if they are not correct. One approach to requirements elicitation is based on the reuse of explicit knowledge. AMAN-DA is a requirement elicitation method that reuses encapsulated knowledge in security and domain ontologies to produce security requirements specifications. The main research question addressed in this paper is to what extent is AMAN-DA able to generate domain-specific security requirements? Following a well-documented process, a case study related to the maritime domain was undertaken with the goal to demonstrate the utility and effectiveness of AMAN-DA for the elicitation and analysis of domain-specific security requirements. The usefulness of the method was also evaluated with a group of 12 experts. The paper demonstrates the elicitation of domain-specific security requirements by presenting the AMAN-DA method and its application. It describes the evaluation and reports some significant results and their implications for practice and future research, especially for the field of knowledge reuse in requirements engineering. © 2017, Springer-Verlag London Ltd.