{"title":"Certifying high assurance software","authors":"J. Voas","doi":"10.1109/CMPSAC.1998.716644","DOIUrl":"https://doi.org/10.1109/CMPSAC.1998.716644","url":null,"abstract":"Software certification processes have become so intertwined with development processes that true product certification, which should demonstrate that the software will behave appropriately, is almost never employed. This deficiency calls for a new generation of certification methodologies. The paper presents a methodology for measuring whether software will do what we want. If the software will, it deserves to be labeled as being of high quality (or high assurance). The methodology we provide is applicable to all types of software, covering the spectrum from safety critical control software to games.","PeriodicalId":252030,"journal":{"name":"Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125921327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Framework-oriented analysis","authors":"F. Zhu, W. Tsai","doi":"10.1109/CMPSAC.1998.716675","DOIUrl":"https://doi.org/10.1109/CMPSAC.1998.716675","url":null,"abstract":"Recently object oriented frameworks have become popular. Application development using frameworks still need analysis, design, coding and testing. The paper presents analysis techniques, Framework-Oriented Analysis (FOA), for application development using frameworks and related techniques. The FOA is an extension of object oriented analysis (OOA), but it explores the reuse of software architecture, design, code and test cases of frameworks. The key features of the FOA include comparison based analysis, feature comparison, hierarchical framework/application (F/A) scenario diagrams, cross reference checking between framework and application objects and methods, multi-level requirement checking.","PeriodicalId":252030,"journal":{"name":"Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116200816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of action history view mechanisms for hypermedia systems","authors":"H. Iwamoto, Chihiro Ito, Y. Kambayashi","doi":"10.1109/CMPSAC.1998.716689","DOIUrl":"https://doi.org/10.1109/CMPSAC.1998.716689","url":null,"abstract":"For computer-supported cooperative work (CSCW), it is very important to understand the activities of users in a group. To support this understanding, we propose a mechanism called an \"action history view\" which shows the past actions of a user to other users for the purpose of letting them know what he/she has done, without revealing secret or useless information. The mechanism is coordinated among users who are distributed in terms of time. In this paper, the concept of the action history view mechanism is applied to hypermedia systems based on an object-oriented model to support users in viewing or reviewing past presentations in a short amount of time in hiding specified actions which it is not appropriate to show to other users. The generation of views is executed by removing a series of actions that correspond with the component to be hidden. The system also has a function for supporting users to select actions interactively while the user is viewing the replay. To qualify those kinds of views, the actions performed in a presentation are recorded in an action history stream, which consists of multiple logs. Finally, the application and implementation of a prototype of the action history view mechanism to a distance education system based on hypermedia is described.","PeriodicalId":252030,"journal":{"name":"Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121658131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interfacing to legacy and object-oriented environments","authors":"B. Healton","doi":"10.1109/CMPSAC.1998.716640","DOIUrl":"https://doi.org/10.1109/CMPSAC.1998.716640","url":null,"abstract":"The history of programming paradigm evolution is presented, showing what practices evolved from the assembler languages to the current object oriented environments. The continuing evolution and enhancement of applications compels current practitioners to work with the realities of the legacy application paradigms. A set of methods and processes are described that reduce the risk of project failures when an interface between legacy and object oriented applications is required.","PeriodicalId":252030,"journal":{"name":"Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125016960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jim-Min Lin, W. Chu, Win-Tsung Lo, Hongji Yang, Chih-Wei Lu
{"title":"Building CORBA objects with DOS software applications","authors":"Jim-Min Lin, W. Chu, Win-Tsung Lo, Hongji Yang, Chih-Wei Lu","doi":"10.1109/CMPSAC.1998.716663","DOIUrl":"https://doi.org/10.1109/CMPSAC.1998.716663","url":null,"abstract":"CORBA is becoming the most important middleware that supports the object-oriented and client/server paradigm in distributed computing systems. However, the application systems based on CORBA are still scarce. One main reason is that only a few CORBA object services have been developed. To develop a new CORBA application, a programmer should make an effort to design a program with a CORBA interface from scratch. In our previous work (Liang et al., 1997), a re-engineering approach was proposed to convert RPC-based programs to CORBA objects, which successfully speeds up the development of CORBA applications. However, the source code is required in this approach. In many cases, software designers may not get hold of the source code. It will be significant to adapt existing PC application software in binary code mode to the object services under CORBA. Our study is addressing this problem. A graphical parking lot management system, which integrates dBase III and AutoCAD V2.6i under DOS has been implemented to demonstrate the feasibility of our approach.","PeriodicalId":252030,"journal":{"name":"Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241)","volume":"8 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114034311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation reuse and inheritance in distributed component systems","authors":"H. Hofmann, J. Stynes","doi":"10.1109/CMPSAC.1998.716701","DOIUrl":"https://doi.org/10.1109/CMPSAC.1998.716701","url":null,"abstract":"Software components are elemental units of software that can be realised within distributed, object oriented architectures such as CORBA or DCOM. The paper describes special aspects of reuse in such componentware architectures and discusses possible mechanisms for implementation reuse. It introduces the concept of Component Adapters-software components mapping requests of client components to appropriate implementations provided by server components. These support the realisation of implementation inheritance at object level (dynamic inheritance). A management architecture is described which supports dynamic inheritance. This includes managing and maintaining a system wide \"object schema\" for inter component inheritance relationships.","PeriodicalId":252030,"journal":{"name":"Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122401672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Ege, Yaman Battikhi, Philippe Pardo, Jinny Uppal, N. Rishe
{"title":"A modular Java API for object-oriented databases","authors":"R. Ege, Yaman Battikhi, Philippe Pardo, Jinny Uppal, N. Rishe","doi":"10.1109/CMPSAC.1998.716636","DOIUrl":"https://doi.org/10.1109/CMPSAC.1998.716636","url":null,"abstract":"The object-oriented programming language Java is an ideal companion to an object-oriented database system. This paper describes our approach to provide a seamless application programmer interface. It is based on a modular architecture with components for database engines, a communications protocol and a JAVA API facilitator. The open architecture is flexible, scalable and distributed in nature.","PeriodicalId":252030,"journal":{"name":"Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124221378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object-oriented model refinement technique in software reengineering","authors":"Wei-Jin Park, Sang-Yoon Min, Doo-Hwan Bae, P. Mah","doi":"10.1109/CMPSAC.1998.716633","DOIUrl":"https://doi.org/10.1109/CMPSAC.1998.716633","url":null,"abstract":"Software reengineering for object-oriented rearchitecturing offers an exciting opportunity in migrating old legacy systems to evolvable systems in a disciplined manner. In the twofold-strategy software reengineering for object-oriented rearchitecturing, one of the problems to be solved is to derive a proper object-oriented model from the output of reverse engineering and the output of forward engineering. In general, the outputs of forward and reverse engineering can be inconsistent in their abstract levels, the amount of design information, naming conventions, and structures. In this paper we present an Object-oriented model Refinement Technique (ORT) to build a final object model in the twofold-strategy software reengineering. We first organize the information gained from reverse engineering into specification information tree, and then compare the entities in the specification information tree with the information from forward engineering using tree-structured data dictionary to produce the final model. We demonstrate the usability of ORT by an example.","PeriodicalId":252030,"journal":{"name":"Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125343634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and the World Wide Web","authors":"B. Thuraisingham","doi":"10.1109/CMPSAC.1998.716664","DOIUrl":"https://doi.org/10.1109/CMPSAC.1998.716664","url":null,"abstract":"With the explosion of data and information on the world wide web (WWW), it is critical that this information be protected to provide privacy to the individuals and organizations. Furthermore, while various tools such as data mining tools and information extraction tools are very useful to extract information from the WWW, they are also becoming a problem to the security and privacy of data on the web. Security and privacy concerns include both technical issues and policy issues. First of all security polices should provide guidance as to what data should and can be placed on the web. Then technology should provide access control to the data. The panel will explore both policy and technology issues for security and privacy on WWW. The panelists are the following.","PeriodicalId":252030,"journal":{"name":"Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129375208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marián D. Fondón, D. Á. Gutiérrez, L. Martínez, F. García, J. M. C. Lovelle
{"title":"Capability-based protection for integral object-oriented systems","authors":"Marián D. Fondón, D. Á. Gutiérrez, L. Martínez, F. García, J. M. C. Lovelle","doi":"10.1109/CMPSAC.1998.716678","DOIUrl":"https://doi.org/10.1109/CMPSAC.1998.716678","url":null,"abstract":"Protection is an essential issue for the heterogeneous distributed interoperable environments, which Java and CORBA are a glimpse of. A uniform protection mechanism such as capabilities integrated with the object model of the system is a good and flexible solution for these environments. Oviedo3 is an example of an integral object oriented system (IOOS) based solely on the OO paradigm, developed over an OO abstract machine (OOAM) and OO operating system (OOOS). When integrated with the object model of the abstract machine, capabilities gain new advantages such as automatic protection. Capabilities also allow more flexible security policies. Existing platforms such as Java, without a uniform protection mechanism, could be made more suitable for these new environments by applying these benefits.","PeriodicalId":252030,"journal":{"name":"Proceedings. The Twenty-Second Annual International Computer Software and Applications Conference (Compsac '98) (Cat. No.98CB 36241)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121667903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}