Loading…
CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 10, October 2008
CONTENTS: 1) Measures and Risk Indicators for Early Insight Into Software Safety by Dr. Victor Basili, Kathleen Dangle, Linda Esker, Frank Marotta, and Ioana Rus. While software increases functionality and control, it also adds complexity and vulnerability to hazards. This article explores a measure...
Saved in:
Main Authors: | , , , , , , , , , , , , , , |
---|---|
Format: | Report |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Basili, Victor Dangle, Kathleen Esker, Linda Marotta, Frank Rus, Ioana Brosgol, Benjamin M Jamin, Sugih Arthur, James D Ravichandar, Ramya Wisnosky, Dennis E Feldshteyn, Dimitry Mancuso, Wil Gough, Al Riutort, Eric J Strassman, Paul |
description | CONTENTS: 1) Measures and Risk Indicators for Early Insight Into Software Safety by Dr. Victor Basili, Kathleen Dangle, Linda Esker, Frank Marotta, and Ioana Rus. While software increases functionality and control, it also adds complexity and vulnerability to hazards. This article explores a measurement approach that provides early visibility into the implementation of the software safety hazard process. 2) Safety and Security: Certification Issues and Technologies by Dr. Benjamin M. Brosgol. This article looks at the DO-178B and the Common Criteria standards, analyzes language-related issues, and assesses three possible technologies for safety-critical or high-security systems. 3) WebBee: A Platform for Secure Mobile Coordination and Communication in Crisis Scenarios by Sugih Jamin. In a disaster, first-responders must be able to communicate using devices they already have and are well-accustomed, on a secure and mobile channel, and with systems beyond the consumer communication infrastructure. This article analyzes how WebBee addresses these concerns. 4) Constructing Change-Tolerant Systems Using Capability-Based Design by Dr. James D. Arthur and Ramya Ravichandar. Advancements in technology have created large-scale software systems that still require change while meeting stakeholder expectations, technology advancements, scheduling constraints, and market demands. This article explores a capability-based approach to evolving change-tolerant systems. 5) DoD Business Mission Area Service-Oriented Architecture to Support Business Transformation by Dennis E. Wisnosky, Dimitry Feldshteyn, Wil Mancuso, Al (Edward) Gough, Eric J. Riutort, and Paul Strassman. Will a service-oriented architecture be the DoD Business Mission Area's answer to their multifaceted operational needs? This article explores their complex business transformation infrastructure as well as the service-oriented architecture's capabilities in readiness, information assurance, and governance.
CrossTalk,The Journal of Defense Software Engineering is co-sponsored by the Department of Defense Chief Information Office (DoD-CIO); the Office of the Secretary of Defense (OSD) Acquisition, Technology and Logistics (AT&L); U.S. Navy (USN); U.S. Air Force (USAF); and the U.S. Department of Homeland Security (DHS). DoD-CIO co-sponsor: Assistant Secretary of Defense (Networks and Information Integration). OSD (AT&L) co-sponsor: Software Engineering and System Assurance.USN cosponsor: Naval Air Systems Co |
format | report |
fullrecord | <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA489892</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA489892</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA4898923</originalsourceid><addsrcrecordid>eNrjZIhyLsovLg5JzMm2UgjJSFXwyi8tykvMUchPU3BJTUvNK05VCM5PKylPLEpVcM1Lz8xLTS3KzEvXUwjLzynNTVUwMtRR8CvNTUotUjA00FHwTy7JB7GNDAwseBhY0xJzilN5oTQ3g4yba4izh25KSWZyfHEJ0KySeEcXRxMLSwtLI2MC0gB47TTh</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 10, October 2008</title><source>DTIC Technical Reports</source><creator>Basili, Victor ; Dangle, Kathleen ; Esker, Linda ; Marotta, Frank ; Rus, Ioana ; Brosgol, Benjamin M ; Jamin, Sugih ; Arthur, James D ; Ravichandar, Ramya ; Wisnosky, Dennis E ; Feldshteyn, Dimitry ; Mancuso, Wil ; Gough, Al ; Riutort, Eric J ; Strassman, Paul</creator><creatorcontrib>Basili, Victor ; Dangle, Kathleen ; Esker, Linda ; Marotta, Frank ; Rus, Ioana ; Brosgol, Benjamin M ; Jamin, Sugih ; Arthur, James D ; Ravichandar, Ramya ; Wisnosky, Dennis E ; Feldshteyn, Dimitry ; Mancuso, Wil ; Gough, Al ; Riutort, Eric J ; Strassman, Paul ; SOFTWARE TECHNOLOGY SUPPORT CENTER HILL AFB UT</creatorcontrib><description>CONTENTS: 1) Measures and Risk Indicators for Early Insight Into Software Safety by Dr. Victor Basili, Kathleen Dangle, Linda Esker, Frank Marotta, and Ioana Rus. While software increases functionality and control, it also adds complexity and vulnerability to hazards. This article explores a measurement approach that provides early visibility into the implementation of the software safety hazard process. 2) Safety and Security: Certification Issues and Technologies by Dr. Benjamin M. Brosgol. This article looks at the DO-178B and the Common Criteria standards, analyzes language-related issues, and assesses three possible technologies for safety-critical or high-security systems. 3) WebBee: A Platform for Secure Mobile Coordination and Communication in Crisis Scenarios by Sugih Jamin. In a disaster, first-responders must be able to communicate using devices they already have and are well-accustomed, on a secure and mobile channel, and with systems beyond the consumer communication infrastructure. This article analyzes how WebBee addresses these concerns. 4) Constructing Change-Tolerant Systems Using Capability-Based Design by Dr. James D. Arthur and Ramya Ravichandar. Advancements in technology have created large-scale software systems that still require change while meeting stakeholder expectations, technology advancements, scheduling constraints, and market demands. This article explores a capability-based approach to evolving change-tolerant systems. 5) DoD Business Mission Area Service-Oriented Architecture to Support Business Transformation by Dennis E. Wisnosky, Dimitry Feldshteyn, Wil Mancuso, Al (Edward) Gough, Eric J. Riutort, and Paul Strassman. Will a service-oriented architecture be the DoD Business Mission Area's answer to their multifaceted operational needs? This article explores their complex business transformation infrastructure as well as the service-oriented architecture's capabilities in readiness, information assurance, and governance.
CrossTalk,The Journal of Defense Software Engineering is co-sponsored by the Department of Defense Chief Information Office (DoD-CIO); the Office of the Secretary of Defense (OSD) Acquisition, Technology and Logistics (AT&L); U.S. Navy (USN); U.S. Air Force (USAF); and the U.S. Department of Homeland Security (DHS). DoD-CIO co-sponsor: Assistant Secretary of Defense (Networks and Information Integration). OSD (AT&L) co-sponsor: Software Engineering and System Assurance.USN cosponsor: Naval Air Systems Command. USAF cosponsors: Oklahoma City-Air Logistics Center (ALC) 76 Software Maintenance Group (SMXG); and Ogden-ALC 309 SMXG. DHS co-sponsor: National Cyber Security Division in the National Protection and Programs Directorate. The original document contains color images.</description><language>eng</language><subject>BUSINESS PROCESS REENGINEERING ; CE(CAPABILITIES ENGINEERING) ; CERTIFICATION ; CHANGE-TOLERANT SYSTEMS ; Computer Programming and Software ; Computer Systems ; Computer Systems Management and Standards ; CRITICALITY(GENERAL) ; DEPARTMENT OF DEFENSE ; ELECTRONIC SECURITY ; EMERGENCIES ; FAULT TOLERANT COMPUTING ; FUNCTION DECOMPOSITION ; HAZARDS ; HIGH LEVEL LANGUAGES ; MILITARY PUBLICATIONS ; RISK MANAGEMENT ; SAFETY-CRITICAL SOFTWARE SYSTEMS ; SECURE COMMUNICATIONS ; SOA(SERVICE-ORIENTED ARCHITECTURE) ; SOFTWARE ENGINEERING ; SYSTEM SAFETY</subject><creationdate>2008</creationdate><rights>Approved for public release; distribution is unlimited.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,27567,27568</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA489892$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Basili, Victor</creatorcontrib><creatorcontrib>Dangle, Kathleen</creatorcontrib><creatorcontrib>Esker, Linda</creatorcontrib><creatorcontrib>Marotta, Frank</creatorcontrib><creatorcontrib>Rus, Ioana</creatorcontrib><creatorcontrib>Brosgol, Benjamin M</creatorcontrib><creatorcontrib>Jamin, Sugih</creatorcontrib><creatorcontrib>Arthur, James D</creatorcontrib><creatorcontrib>Ravichandar, Ramya</creatorcontrib><creatorcontrib>Wisnosky, Dennis E</creatorcontrib><creatorcontrib>Feldshteyn, Dimitry</creatorcontrib><creatorcontrib>Mancuso, Wil</creatorcontrib><creatorcontrib>Gough, Al</creatorcontrib><creatorcontrib>Riutort, Eric J</creatorcontrib><creatorcontrib>Strassman, Paul</creatorcontrib><creatorcontrib>SOFTWARE TECHNOLOGY SUPPORT CENTER HILL AFB UT</creatorcontrib><title>CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 10, October 2008</title><description>CONTENTS: 1) Measures and Risk Indicators for Early Insight Into Software Safety by Dr. Victor Basili, Kathleen Dangle, Linda Esker, Frank Marotta, and Ioana Rus. While software increases functionality and control, it also adds complexity and vulnerability to hazards. This article explores a measurement approach that provides early visibility into the implementation of the software safety hazard process. 2) Safety and Security: Certification Issues and Technologies by Dr. Benjamin M. Brosgol. This article looks at the DO-178B and the Common Criteria standards, analyzes language-related issues, and assesses three possible technologies for safety-critical or high-security systems. 3) WebBee: A Platform for Secure Mobile Coordination and Communication in Crisis Scenarios by Sugih Jamin. In a disaster, first-responders must be able to communicate using devices they already have and are well-accustomed, on a secure and mobile channel, and with systems beyond the consumer communication infrastructure. This article analyzes how WebBee addresses these concerns. 4) Constructing Change-Tolerant Systems Using Capability-Based Design by Dr. James D. Arthur and Ramya Ravichandar. Advancements in technology have created large-scale software systems that still require change while meeting stakeholder expectations, technology advancements, scheduling constraints, and market demands. This article explores a capability-based approach to evolving change-tolerant systems. 5) DoD Business Mission Area Service-Oriented Architecture to Support Business Transformation by Dennis E. Wisnosky, Dimitry Feldshteyn, Wil Mancuso, Al (Edward) Gough, Eric J. Riutort, and Paul Strassman. Will a service-oriented architecture be the DoD Business Mission Area's answer to their multifaceted operational needs? This article explores their complex business transformation infrastructure as well as the service-oriented architecture's capabilities in readiness, information assurance, and governance.
CrossTalk,The Journal of Defense Software Engineering is co-sponsored by the Department of Defense Chief Information Office (DoD-CIO); the Office of the Secretary of Defense (OSD) Acquisition, Technology and Logistics (AT&L); U.S. Navy (USN); U.S. Air Force (USAF); and the U.S. Department of Homeland Security (DHS). DoD-CIO co-sponsor: Assistant Secretary of Defense (Networks and Information Integration). OSD (AT&L) co-sponsor: Software Engineering and System Assurance.USN cosponsor: Naval Air Systems Command. USAF cosponsors: Oklahoma City-Air Logistics Center (ALC) 76 Software Maintenance Group (SMXG); and Ogden-ALC 309 SMXG. DHS co-sponsor: National Cyber Security Division in the National Protection and Programs Directorate. The original document contains color images.</description><subject>BUSINESS PROCESS REENGINEERING</subject><subject>CE(CAPABILITIES ENGINEERING)</subject><subject>CERTIFICATION</subject><subject>CHANGE-TOLERANT SYSTEMS</subject><subject>Computer Programming and Software</subject><subject>Computer Systems</subject><subject>Computer Systems Management and Standards</subject><subject>CRITICALITY(GENERAL)</subject><subject>DEPARTMENT OF DEFENSE</subject><subject>ELECTRONIC SECURITY</subject><subject>EMERGENCIES</subject><subject>FAULT TOLERANT COMPUTING</subject><subject>FUNCTION DECOMPOSITION</subject><subject>HAZARDS</subject><subject>HIGH LEVEL LANGUAGES</subject><subject>MILITARY PUBLICATIONS</subject><subject>RISK MANAGEMENT</subject><subject>SAFETY-CRITICAL SOFTWARE SYSTEMS</subject><subject>SECURE COMMUNICATIONS</subject><subject>SOA(SERVICE-ORIENTED ARCHITECTURE)</subject><subject>SOFTWARE ENGINEERING</subject><subject>SYSTEM SAFETY</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2008</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZIhyLsovLg5JzMm2UgjJSFXwyi8tykvMUchPU3BJTUvNK05VCM5PKylPLEpVcM1Lz8xLTS3KzEvXUwjLzynNTVUwMtRR8CvNTUotUjA00FHwTy7JB7GNDAwseBhY0xJzilN5oTQ3g4yba4izh25KSWZyfHEJ0KySeEcXRxMLSwtLI2MC0gB47TTh</recordid><startdate>200810</startdate><enddate>200810</enddate><creator>Basili, Victor</creator><creator>Dangle, Kathleen</creator><creator>Esker, Linda</creator><creator>Marotta, Frank</creator><creator>Rus, Ioana</creator><creator>Brosgol, Benjamin M</creator><creator>Jamin, Sugih</creator><creator>Arthur, James D</creator><creator>Ravichandar, Ramya</creator><creator>Wisnosky, Dennis E</creator><creator>Feldshteyn, Dimitry</creator><creator>Mancuso, Wil</creator><creator>Gough, Al</creator><creator>Riutort, Eric J</creator><creator>Strassman, Paul</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>200810</creationdate><title>CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 10, October 2008</title><author>Basili, Victor ; Dangle, Kathleen ; Esker, Linda ; Marotta, Frank ; Rus, Ioana ; Brosgol, Benjamin M ; Jamin, Sugih ; Arthur, James D ; Ravichandar, Ramya ; Wisnosky, Dennis E ; Feldshteyn, Dimitry ; Mancuso, Wil ; Gough, Al ; Riutort, Eric J ; Strassman, Paul</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA4898923</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2008</creationdate><topic>BUSINESS PROCESS REENGINEERING</topic><topic>CE(CAPABILITIES ENGINEERING)</topic><topic>CERTIFICATION</topic><topic>CHANGE-TOLERANT SYSTEMS</topic><topic>Computer Programming and Software</topic><topic>Computer Systems</topic><topic>Computer Systems Management and Standards</topic><topic>CRITICALITY(GENERAL)</topic><topic>DEPARTMENT OF DEFENSE</topic><topic>ELECTRONIC SECURITY</topic><topic>EMERGENCIES</topic><topic>FAULT TOLERANT COMPUTING</topic><topic>FUNCTION DECOMPOSITION</topic><topic>HAZARDS</topic><topic>HIGH LEVEL LANGUAGES</topic><topic>MILITARY PUBLICATIONS</topic><topic>RISK MANAGEMENT</topic><topic>SAFETY-CRITICAL SOFTWARE SYSTEMS</topic><topic>SECURE COMMUNICATIONS</topic><topic>SOA(SERVICE-ORIENTED ARCHITECTURE)</topic><topic>SOFTWARE ENGINEERING</topic><topic>SYSTEM SAFETY</topic><toplevel>online_resources</toplevel><creatorcontrib>Basili, Victor</creatorcontrib><creatorcontrib>Dangle, Kathleen</creatorcontrib><creatorcontrib>Esker, Linda</creatorcontrib><creatorcontrib>Marotta, Frank</creatorcontrib><creatorcontrib>Rus, Ioana</creatorcontrib><creatorcontrib>Brosgol, Benjamin M</creatorcontrib><creatorcontrib>Jamin, Sugih</creatorcontrib><creatorcontrib>Arthur, James D</creatorcontrib><creatorcontrib>Ravichandar, Ramya</creatorcontrib><creatorcontrib>Wisnosky, Dennis E</creatorcontrib><creatorcontrib>Feldshteyn, Dimitry</creatorcontrib><creatorcontrib>Mancuso, Wil</creatorcontrib><creatorcontrib>Gough, Al</creatorcontrib><creatorcontrib>Riutort, Eric J</creatorcontrib><creatorcontrib>Strassman, Paul</creatorcontrib><creatorcontrib>SOFTWARE TECHNOLOGY SUPPORT CENTER HILL AFB UT</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Basili, Victor</au><au>Dangle, Kathleen</au><au>Esker, Linda</au><au>Marotta, Frank</au><au>Rus, Ioana</au><au>Brosgol, Benjamin M</au><au>Jamin, Sugih</au><au>Arthur, James D</au><au>Ravichandar, Ramya</au><au>Wisnosky, Dennis E</au><au>Feldshteyn, Dimitry</au><au>Mancuso, Wil</au><au>Gough, Al</au><au>Riutort, Eric J</au><au>Strassman, Paul</au><aucorp>SOFTWARE TECHNOLOGY SUPPORT CENTER HILL AFB UT</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 10, October 2008</btitle><date>2008-10</date><risdate>2008</risdate><abstract>CONTENTS: 1) Measures and Risk Indicators for Early Insight Into Software Safety by Dr. Victor Basili, Kathleen Dangle, Linda Esker, Frank Marotta, and Ioana Rus. While software increases functionality and control, it also adds complexity and vulnerability to hazards. This article explores a measurement approach that provides early visibility into the implementation of the software safety hazard process. 2) Safety and Security: Certification Issues and Technologies by Dr. Benjamin M. Brosgol. This article looks at the DO-178B and the Common Criteria standards, analyzes language-related issues, and assesses three possible technologies for safety-critical or high-security systems. 3) WebBee: A Platform for Secure Mobile Coordination and Communication in Crisis Scenarios by Sugih Jamin. In a disaster, first-responders must be able to communicate using devices they already have and are well-accustomed, on a secure and mobile channel, and with systems beyond the consumer communication infrastructure. This article analyzes how WebBee addresses these concerns. 4) Constructing Change-Tolerant Systems Using Capability-Based Design by Dr. James D. Arthur and Ramya Ravichandar. Advancements in technology have created large-scale software systems that still require change while meeting stakeholder expectations, technology advancements, scheduling constraints, and market demands. This article explores a capability-based approach to evolving change-tolerant systems. 5) DoD Business Mission Area Service-Oriented Architecture to Support Business Transformation by Dennis E. Wisnosky, Dimitry Feldshteyn, Wil Mancuso, Al (Edward) Gough, Eric J. Riutort, and Paul Strassman. Will a service-oriented architecture be the DoD Business Mission Area's answer to their multifaceted operational needs? This article explores their complex business transformation infrastructure as well as the service-oriented architecture's capabilities in readiness, information assurance, and governance.
CrossTalk,The Journal of Defense Software Engineering is co-sponsored by the Department of Defense Chief Information Office (DoD-CIO); the Office of the Secretary of Defense (OSD) Acquisition, Technology and Logistics (AT&L); U.S. Navy (USN); U.S. Air Force (USAF); and the U.S. Department of Homeland Security (DHS). DoD-CIO co-sponsor: Assistant Secretary of Defense (Networks and Information Integration). OSD (AT&L) co-sponsor: Software Engineering and System Assurance.USN cosponsor: Naval Air Systems Command. USAF cosponsors: Oklahoma City-Air Logistics Center (ALC) 76 Software Maintenance Group (SMXG); and Ogden-ALC 309 SMXG. DHS co-sponsor: National Cyber Security Division in the National Protection and Programs Directorate. The original document contains color images.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_dtic_stinet_ADA489892 |
source | DTIC Technical Reports |
subjects | BUSINESS PROCESS REENGINEERING CE(CAPABILITIES ENGINEERING) CERTIFICATION CHANGE-TOLERANT SYSTEMS Computer Programming and Software Computer Systems Computer Systems Management and Standards CRITICALITY(GENERAL) DEPARTMENT OF DEFENSE ELECTRONIC SECURITY EMERGENCIES FAULT TOLERANT COMPUTING FUNCTION DECOMPOSITION HAZARDS HIGH LEVEL LANGUAGES MILITARY PUBLICATIONS RISK MANAGEMENT SAFETY-CRITICAL SOFTWARE SYSTEMS SECURE COMMUNICATIONS SOA(SERVICE-ORIENTED ARCHITECTURE) SOFTWARE ENGINEERING SYSTEM SAFETY |
title | CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 10, October 2008 |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T15%3A13%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=CrossTalk:%20The%20Journal%20of%20Defense%20Software%20Engineering.%20Volume%2021,%20Number%2010,%20October%202008&rft.au=Basili,%20Victor&rft.aucorp=SOFTWARE%20TECHNOLOGY%20SUPPORT%20CENTER%20HILL%20AFB%20UT&rft.date=2008-10&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA489892%3C/dtic_1RU%3E%3Cgrp_id%3Ecdi_FETCH-dtic_stinet_ADA4898923%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |