Current Search: Fernandez, Eduardo B. (x)
View All Items
Pages
- Title
- OPTIMAL SCHEDULING OF PROCESSES FOR A NETWORK OF TRANSPUTERS (MULTIPROCESSOR, OCCAM, CONCURRENT PROCESSING).
- Creator
- NGO, TON ANH., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Concurrency at both the hardware and software level has recently been considered as the solution to the classic Von Neuman bottleneck in system design. Introduced by Inmos, the Occam language and the Transputer microprocessor provide simple and elegant building blocks for a concurrent system. This thesis proposes a set of algorithms to find an optimal deterministic schedule for an Occam program executed on a network of Transputers. Also discussed are features of the network relevant to the...
Show moreConcurrency at both the hardware and software level has recently been considered as the solution to the classic Von Neuman bottleneck in system design. Introduced by Inmos, the Occam language and the Transputer microprocessor provide simple and elegant building blocks for a concurrent system. This thesis proposes a set of algorithms to find an optimal deterministic schedule for an Occam program executed on a network of Transputers. Also discussed are features of the network relevant to the problem of scheduling, and a complete example is provided to illustrate the scheduler. The approaches described can be used as a basis for implementing a flexible general purpose multiprocessor system.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14351
- Subject Headings
- Multiprocessors, Computer networks
- Format
- Document (PDF)
- Title
- Object-oriented models for manufacturing inventory control systems.
- Creator
- Peng, ZhiWei., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The inventory is a key element in modern manufacturing systems. We present here object-oriented manufacturing inventory models, including detailed static and dynamic models. Three different representations of the object model are presented and compared. Two case studies are given to verify the extensibility and reusability of the models. One of the models is developed into a pattern, that can be used as a prototype for similar type of systems, e.g., an inventory of the books in a library....
Show moreThe inventory is a key element in modern manufacturing systems. We present here object-oriented manufacturing inventory models, including detailed static and dynamic models. Three different representations of the object model are presented and compared. Two case studies are given to verify the extensibility and reusability of the models. One of the models is developed into a pattern, that can be used as a prototype for similar type of systems, e.g., an inventory of the books in a library. Comparison of our inventory model with other inventory data models is also presented.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15394
- Subject Headings
- Object-oriented methods (Computer science), Inventory control
- Format
- Document (PDF)
- Title
- Object-oriented analysis and design of a serial peripheral interface monitor.
- Creator
- Scharf, Sherri Hannah., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Presented here is an object-oriented design for a real-time system used to monitor bus activity on a microcontroller via a PC. This system could prove to be an inexpensive and user-friendly alternative to existing hardware used for this purpose. The use of an object-oriented design methodology and the application of two Model-View-Controller architectures as well as a layered approach aided in producing a system composed of reusable components that is flexible and easily extensible....
Show morePresented here is an object-oriented design for a real-time system used to monitor bus activity on a microcontroller via a PC. This system could prove to be an inexpensive and user-friendly alternative to existing hardware used for this purpose. The use of an object-oriented design methodology and the application of two Model-View-Controller architectures as well as a layered approach aided in producing a system composed of reusable components that is flexible and easily extensible. Additionally, a reusable pattern can be extracted from the architecture presented here that could be utilized in designing similar software applications for communicating with peripheral hardware devices.
Show less - Date Issued
- 1998
- PURL
- http://purl.flvc.org/fcla/dt/15538
- Subject Headings
- Object-oriented methods (Computer science), User interfaces (Computer systems)
- Format
- Document (PDF)
- Title
- Security in voice over IP networks.
- Creator
- Pelaez, Juan C., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Voice over IP (VoIP) is revolutionizing the global communications system by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in one simplified network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. This thesis will present a combination of security patterns based on...
Show moreVoice over IP (VoIP) is revolutionizing the global communications system by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in one simplified network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. This thesis will present a combination of security patterns based on the systematic analysis of attacks against a VoIP network and the existing techniques to mitigate these attacks, providing good practices for all IP telephony systems. The VoIP Security Patterns which are based on object-oriented modeling, will help network designers to improve the level of security not only in voice but also in data, video, and fax over IP networks.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13190
- Subject Headings
- Internet telephony--Security measures, Computer network protocols, Multimedia systems
- Format
- Document (PDF)
- Title
- Reliability modeling of fault-tolerant software.
- Creator
- Leu, Shao-Wei., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
We have developed reliability models for a variety of fault-tolerant software constructs including those based on two well-known methodologies: recovery block and N-version programming, and their variations. We also developed models for the conversation scheme which provides fault tolerance for concurrent software and a newly proposed system architecture, the recovery metaprogram, which attempts to unify most of the existing fault-tolerant strategies. Each model is evaluated using either GSPN...
Show moreWe have developed reliability models for a variety of fault-tolerant software constructs including those based on two well-known methodologies: recovery block and N-version programming, and their variations. We also developed models for the conversation scheme which provides fault tolerance for concurrent software and a newly proposed system architecture, the recovery metaprogram, which attempts to unify most of the existing fault-tolerant strategies. Each model is evaluated using either GSPN, a software package based on Generalized Stochastic Petri Nets, or Sharpe, an evaluation tool for Markov models. The numerical results are then analyzed and compared. Major results derived from this process include the identification of critical parameters for each model, the comparisons of relative performance among different software constructs, the justification of a preliminary approach to the modeling of complex conversations, and the justification of recovery metaprogram regarding improvement of reliability.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/12256
- Subject Headings
- Fault-tolerant computing, Computer software--Reliability
- Format
- Document (PDF)
- Title
- Secure access of legacy databases from the Web using CORBA.
- Creator
- Xue, Richard Zhihuai., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
After comparing general architectures for accessing business databases from the Web, we propose a platform-independent, language-independent, object-oriented, fourtier CORBA-based architecture. The proposed architecture is presented in pattern format. Several security mechanisms are incorporated into the proposed architecture. A Web Reservation System (WRS) was created to test this architecture. Starting from an analysis pattern, a design model for the WRS was developed using the CORBA Object...
Show moreAfter comparing general architectures for accessing business databases from the Web, we propose a platform-independent, language-independent, object-oriented, fourtier CORBA-based architecture. The proposed architecture is presented in pattern format. Several security mechanisms are incorporated into the proposed architecture. A Web Reservation System (WRS) was created to test this architecture. Starting from an analysis pattern, a design model for the WRS was developed using the CORBA Object Request Broker (ORB); this was a Virtual Car Reservation System (VCRS). In the VCRS system, a user can get a reservation number when necessary information is entered from a Web browser. The user can also retrieve the reservation information by using the reservation number. All reservation information is stored in a distributed database system at a remote site. A realistic application of the proposed architecture is also described. We also provide an evaluation and comparison of the proposed architecture with other architectures.
Show less - Date Issued
- 2000
- PURL
- http://purl.flvc.org/fcla/dt/15756
- Subject Headings
- Computer security, CORBA (Computer architecture), World Wide Web, Distributed databases, Internet, Business--Data processing
- Format
- Document (PDF)
- Title
- VoIP Network Security and Forensic Models using Patterns.
- Creator
- Pelaez, Juan C., Fernandez, Eduardo B., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Voice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP networks are still in their infancy. VoIP devices and networks are commonly attacked, and it is therefore necessary to analyze the threats against the converged network and the techniques that exist today to stop or mitigate these attacks. We also need to understand what evidence can be obtained from the VoIP system after an attack has occurred....
Show moreVoice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP networks are still in their infancy. VoIP devices and networks are commonly attacked, and it is therefore necessary to analyze the threats against the converged network and the techniques that exist today to stop or mitigate these attacks. We also need to understand what evidence can be obtained from the VoIP system after an attack has occurred. Many of these attacks occur in similar ways in different contexts or environments. Generic solutions to these issues can be expressed as patterns. A pattern can be used to guide the design or simulation of VoIP systems as an abstract solution to a problem in this environment. Patterns have shown their value in developing good quality software and we expect that their application to VoIP will also prove valuable to build secure systems. This dissertation presents a variety of patterns (architectural, attack, forensic and security patterns). These patterns will help forensic analysts as well, as secure systems developers because they provide a systematic approach to structure the required information and help understand system weaknesses. The patterns will also allow us to specify, analyze and implement network security investigations for different architectures. The pattern system uses object-oriented modeling (Unified Modeling Language) as a way to formalize the information and dynamics of attacks and systems.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012576
- Subject Headings
- Internet telephony--Security measures, Computer network protocols, Global system for mobile communications, Software engineering
- Format
- Document (PDF)
- Title
- A critical comparison of three user interface architectures in object-oriented design.
- Creator
- Walls, David Paul., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Frameworks for the development of object-oriented, user interactive applications have been examined. Three alternate approaches have been explored; the Model-View-Controller (MVC) approach, the MVC++ approach and the Presentation-Abstraction-Control (PAC) approach. For the purpose of assessing the approaches, a simple engineering application was selected for object-oriented analysis using the three techniques. The utility of each technique was compared on the basis of complexity,...
Show moreFrameworks for the development of object-oriented, user interactive applications have been examined. Three alternate approaches have been explored; the Model-View-Controller (MVC) approach, the MVC++ approach and the Presentation-Abstraction-Control (PAC) approach. For the purpose of assessing the approaches, a simple engineering application was selected for object-oriented analysis using the three techniques. The utility of each technique was compared on the basis of complexity, extensibility and reusability. While the approaches aim to provide reusable user interface components and extensibility through incorporation of an additional class, only MVC++ and PAC truly achieve this goal, although at the expense of introducing additional messaging complexity. It was also noted that, in general, decoupling of the GUI classes, while providing increased extensibility and reusability, increases the inter-object messaging requirement.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15747
- Subject Headings
- User interfaces (Computer systems), Object-oriented methods (Computer science)
- Format
- Document (PDF)
- Title
- GENERIC NETWORK EXECUTIVE.
- Creator
- SARMIENTO, JESUS LEOPOLDO., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
A Generic Network Executive (GNE) package is presented in this thesis. It encompasses the strategy and methodology to follow when implementing data communication software. GNE was designed for portability and high utilization of available resources (efficiency). It does not impose implementation constraints because it does not include features specific to any system (hardware or operating system}. It uses a highly concurrent process model with a pipelined structure . It is not protocol...
Show moreA Generic Network Executive (GNE) package is presented in this thesis. It encompasses the strategy and methodology to follow when implementing data communication software. GNE was designed for portability and high utilization of available resources (efficiency). It does not impose implementation constraints because it does not include features specific to any system (hardware or operating system}. It uses a highly concurrent process model with a pipelined structure . It is not protocol dependent, rather it is meant to be used to implement low level services for higher level communic ation protocols. It is intended to provide interprocess communication in distributed systems by coupling application programs with a general purpose packet delivery system, i.e., a datagram service.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14321
- Subject Headings
- Computer networks, Data transmission systems
- Format
- Document (PDF)
- Title
- A MAINTENANCE PROCESSOR FOR THE IBM SERIES/1 (SERVICE, DIAGNOSTIC).
- Creator
- MURPHY, DAVID JAMES, III., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
As the Series/1 is used in more complex, unattended, or critical applications, users of the product cannot tolerate the mean time to repair of the current field service support. Long waits for technicians to arrive, troubleshoot the system, and repair or replace parts are no longer acceptable. This thesis presents the system architecture and functional capabilities of a maintenance processor for the Series/1. The maintenance processor designed herein can be used as the focal point of most...
Show moreAs the Series/1 is used in more complex, unattended, or critical applications, users of the product cannot tolerate the mean time to repair of the current field service support. Long waits for technicians to arrive, troubleshoot the system, and repair or replace parts are no longer acceptable. This thesis presents the system architecture and functional capabilities of a maintenance processor for the Series/1. The maintenance processor designed herein can be used as the focal point of most system support activities. This approach has been used in mainframe systems for some time but has not, in the past, been deemed feasible for smaller systerns such as the Series/1. This effort demonstrates the feasibility of a maintenance processor in such systems, resulting in a simplification of hardware and software while providing a significant improvement in total system reliability, availability, and serviceability.
Show less - Date Issued
- 1985
- PURL
- http://purl.flvc.org/fcla/dt/14248
- Subject Headings
- IBM Series/1 (Computer), Software maintenance
- Format
- Document (PDF)
- Title
- MEMORY LOADER SYSTEM FOR AN AUTOMATIC TEST SET.
- Creator
- MASKASKY, ROBERT JAY., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The STS 6003500 computerized automatic teat set is used to support the AH/ASN-91 computer used in the Navy's A-7 attack aircraft. The teat set currently loads teat programs from an IBM 2415 Magnetic tape unit which is obsolete. A new memory loader system is needed to load test programs into the teat set. Using modern Personal Computer technology, this can be accomplished economically with a personal computer and a hard disk drive. The personal computer will act as an intelligent interface...
Show moreThe STS 6003500 computerized automatic teat set is used to support the AH/ASN-91 computer used in the Navy's A-7 attack aircraft. The teat set currently loads teat programs from an IBM 2415 Magnetic tape unit which is obsolete. A new memory loader system is needed to load test programs into the teat set. Using modern Personal Computer technology, this can be accomplished economically with a personal computer and a hard disk drive. The personal computer will act as an intelligent interface between the bard disk drive and the teat set. The personal computer can also provide numerous functions for the convenience of the teat set operator. The flexibility of the personal computer allows easy adaptation to other computerized automatic test sets which are faced with similar problems.
Show less - Date Issued
- 1986
- PURL
- http://purl.flvc.org/fcla/dt/14345
- Subject Headings
- Computer interfaces, Microcomputers
- Format
- Document (PDF)
- Title
- Extensions to real-time object-oriented software design methodologies.
- Creator
- Woodcock, Timothy G., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Real-time systems are systems where time is considered a system resource that needs to be managed. Time is usually represented in these systems as a deadline to complete a task. Unfortunately, by adding timing to even simple algorithms, it complicates them greatly. Real-time systems are by nature difficult and complex to understand. Object-oriented methodologies have attributes that allow real-time systems to be designed and implemented with less error and some control over the resultant...
Show moreReal-time systems are systems where time is considered a system resource that needs to be managed. Time is usually represented in these systems as a deadline to complete a task. Unfortunately, by adding timing to even simple algorithms, it complicates them greatly. Real-time systems are by nature difficult and complex to understand. Object-oriented methodologies have attributes that allow real-time systems to be designed and implemented with less error and some control over the resultant complexity. With object-oriented design, the system is modeled in the environment that it will be used in. Objects themselves, are partitions of the system, into logical, understandable units. In this dissertation, we start by surveying the current real-time object-oriented design methodologies. By comparing these methodologies and developing a set of criteria for evaluating them, we discover that certain aspects of these methodologies still need some work. The most important aspects of the methodologies are understanding the effects of deadlines on statechart behavioral models and understanding the effects of deadlines when object models are inherited or undergo aggregation. The effects of deadlines on statecharts are then explored in detail. There are two basic ways that deadlines are added to statecharts. The first, and most popular, is adding timing as a condition on a state transition. The second is adding a count down timer to a state and forcing a transition if the timer reaches zero. We show that these are equivalent and can be used interchangeably to simplify designs. Next, the effects of deadlines on behavior models when the corresponding object models undergo inheritance or aggregation are studied. We will first analyze the effects on the behavior model when object inheritance is encountered. We found eight ways that the behavior model can be modified and still maintain the properties of inheritance. Finally, deadlines are added and the analysis is repeated.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/12493
- Subject Headings
- Real-time data processing, Computer software--Development, Object-oriented programming (Computer science)
- Format
- Document (PDF)
- Title
- A selectively redundant file system.
- Creator
- Veradt, Joy L., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Disk arrays have been proposed as a means of achieving high performance, reliability and availability in computer systems. This study looks at the RAID (Redundant Array of Inexpensive Disks) disk array architecture and its advantages and disadvantages for use in personal computer environments, specifically in terms of how data is protected (redundant information) and the tradeoff required to achieve that protection (sacrifice of disk capacity). It then proposes an alternative to achieving a...
Show moreDisk arrays have been proposed as a means of achieving high performance, reliability and availability in computer systems. This study looks at the RAID (Redundant Array of Inexpensive Disks) disk array architecture and its advantages and disadvantages for use in personal computer environments, specifically in terms of how data is protected (redundant information) and the tradeoff required to achieve that protection (sacrifice of disk capacity). It then proposes an alternative to achieving a real-time method of protecting a user's data, which involves the modification of an operating system's file system to implement selective redundancy at the file level. This approach, based on modified RAIDs, is shown to be considerably more efficient in using the capacity of the available disks. It also provides flexibility in allowing users to tradeoff space for reliability.
Show less - Date Issued
- 1992
- PURL
- http://purl.flvc.org/fcla/dt/14844
- Subject Headings
- Computer files--Reliability, Systems software--Reliability, Databases--Reliability
- Format
- Document (PDF)
- Title
- A transputer-based fault-tolerant robot controller.
- Creator
- Kulkarni, Shubhada R., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years robots have become increasingly important in many areas. A robotic controller requires high speed and high reliability and its design must continue these two aspects. This thesis presents a design for a Transputer based fault tolerant robot controller. For concreteness, we have designed this controller for a specific robot, the SEDAB, a prototype developed by IBM Corp. This design attempts to satisfy the two requirements of speed and reliability. Speed is achieved by the use...
Show moreIn recent years robots have become increasingly important in many areas. A robotic controller requires high speed and high reliability and its design must continue these two aspects. This thesis presents a design for a Transputer based fault tolerant robot controller. For concreteness, we have designed this controller for a specific robot, the SEDAB, a prototype developed by IBM Corp. This design attempts to satisfy the two requirements of speed and reliability. Speed is achieved by the use of a concurrent structure composed of Transputers. Reliability is provided by a self-testing mechanism and a multiprocessor system architecture. The Occam implementation of the robot processes is described. We have evaluated the reliability of this controller. The reliability study shows that there is a significant increase in the reliability of this controller due to the new architecture and proposed fault detection mechanism. While we have not been able to actually control this robot, we have shown that some scheduling heuristics can be effectively used to provide a higher level of performance.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14616
- Subject Headings
- Robots--Control systems, Automatic control--Computer programs
- Format
- Document (PDF)
- Title
- A recovery metaprogram for fault diagnosis in a network of processors.
- Creator
- Pendse, Sateesh V., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Recent advances in computer technology have increased the performance of computers, but application requirements will always exceed the performance level available today. This requires the use of multiprocessors. The importance of multiprocessor systems is increasing due to many reasons, one of which is reliability. Reliability is also an important aspect in any computer system design. For reliable operation the system should be able to detect and locate most of its faults. The idea of using...
Show moreRecent advances in computer technology have increased the performance of computers, but application requirements will always exceed the performance level available today. This requires the use of multiprocessors. The importance of multiprocessor systems is increasing due to many reasons, one of which is reliability. Reliability is also an important aspect in any computer system design. For reliable operation the system should be able to detect and locate most of its faults. The idea of using a set of processes collectively known as a Recovery Metaprogram (RMP) is applied in this thesis to system diagnosis. Several error location algorithms are analyzed and compared. Most of them are comparison methods. A new algorithm, called Duplication algorithm, is developed and analyzed. Primitives, oriented to the specific functions of error diagnosis, required by the RMP to coordinate recovery functions are also developed in this thesis.
Show less - Date Issued
- 1990
- PURL
- http://purl.flvc.org/fcla/dt/14656
- Subject Headings
- Fault location (Engineering)--Data processing, Multiprocessors
- Format
- Document (PDF)
- Title
- CYBER-PHYSICAL SYSTEMS: BUILDING A SECURITY REFERENCE ARCHITECTURE FOR CARGO PORTS.
- Creator
- Romero, Virginia Mendiola, Fernandez, Eduardo B., Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science, College of Engineering and Computer Science
- Abstract/Description
-
Cyber-Physical Systems (CPS) are physical entities whose operations are monitored, coordinated, and controlled by a computing and communication core. These systems are highly heterogeneous and complex. Their numerous components and cross domain complexity make attacks easy to propagate and security difficult to implement. Consequently, to secure these systems, they need to be built in a systematic and holistic way, where security is an integral part of the development lifecycle and not just...
Show moreCyber-Physical Systems (CPS) are physical entities whose operations are monitored, coordinated, and controlled by a computing and communication core. These systems are highly heterogeneous and complex. Their numerous components and cross domain complexity make attacks easy to propagate and security difficult to implement. Consequently, to secure these systems, they need to be built in a systematic and holistic way, where security is an integral part of the development lifecycle and not just an activity after development. These systems present a multitude of implementation details in their component units, so it is fundamental to use abstraction in the analysis and construction of their architecture. In particular, we can apply abstraction through the use of patterns. Pattern-based architectural modeling is a powerful way to describe the system and analyze its security and the other non-functional aspects. Patterns also have the potential to unify the design of their computational, communication, and control aspects. Architectural modeling can be performed through UML diagrams to show the interactions and dependencies between different components and its stakeholders. Also, it can be used to analyze security threats and describe the possible countermeasures to mitigate these threats. An important type of CPS is a maritime container terminal, a facility where cargo containers are transported between ships and land vehicles; for example, trains or trucks, for onward transportation, and vice versa. Every cargo port performs four basic functions: receiving, storing, staging and loading for both, import and export containers. We present here a set of patterns that describe the elements and functions of a cargo port system, and a Reference Architecture (RA) built using these patterns. We analyze and systematically enumerate the possible security threats to a container terminal in a cargo port using activity diagrams derived from selected use cases of the system. We describe these threats using misuse patterns, and from them select security patterns as defenses. The RA provides a framework to determine where to add these security mechanisms to stop or mitigate these threats and build a Security Reference Architecture (SRA) for CPS. An SRA is an abstract architecture describing a conceptual model of security that provides a way to specify security requirements for a wide range of concrete architectures. The analysis and design are given using a cargo port as our example, but the approach can be used in other domains as well. This is the first work we know where patterns and RAs are used to represent cargo ports and analyze their security.
Show less - Date Issued
- 2021
- PURL
- http://purl.flvc.org/fau/fd/FA00013737
- Subject Headings
- Cyber-physical systems, Cooperating objects (Computer systems), Container terminals
- Format
- Document (PDF)