Information Technology Reference
In-Depth Information
of the problem through successive refinements,
and an incremental growth of an effective solution
through several versions. Thus, in each iteration
of the process, new and necessary characteristics
can be added and extended so that a complete final
design is obtained. Also, it is a reusable process
in the sense of the utilization of artifacts built in
others executions of this process or in previous
iterations which have been validated and tested
and that improve the quality of the new artifacts
built and save developers' time and effort.
The structure of the process which we propose
follows the classical cycle, in which we find a
planning phase, a development phase including
analysis, design and construction and finally a
maintenance phase. The phases of planning and
maintenance are common phases which any de-
velopment of information systems has to define,
so we move on a generic development process to
carry out the activities and tasks of these phases.
Thus, our work focuses on defining what is really
specific and differentiating in developing systems
based on Grid computing, the development phase.
This phase consists of three activities, analysis,
design and construction, and each of them de-
fines the specific tasks necessary, the artifacts to
be used, and the steps to take to analyze, design
and build specific information systems as Mobile
Grid systems are.
Therefore, the main block of this process con-
sists of a requirements analysis activity driven by
use cases (Rosado, Fernández-Medina, López, &
Piattini, 2010a), a design activity that focuses on
architecture (Rosado, Fernández-Medina, López,
& Piattini, 2011), and construction activity ori-
ented to implementation. All these activities are
supported by a repository where different reus-
able elements which can be used in the different
activities and tasks of the process are stored. These
reusable elements are use cases and security use
cases diagrams oriented to Grid systems to be
reused in the analysis activity to capture the secu-
rity requirements (Rosado, Fernández-Medina, &
López, 2009a, 2009b, 2009c; Rosado, Fernández-
Medina, López, & Piattini, 2010b); a reference
security architecture (Rosado, Fernández-Medina,
& López, 2011b) where we define security ser-
vices for Mobile Grid environments reused in the
design activity which guarantees that the system
is built under a secure environment and meets all
the requirements and security needs of the system;
and implemented interfaces based on Grid tools
and platforms (as Globus) to be reused in the
construction activity (See Figure 1).
In this paper, we study one of the tasks of the
secure mobile grid system analysis activity, the
Identification of secure Mobile Grid Use Cases
task whose steps can be seen in Figure 3. In this
task we identify threats and risks related to mobile
grid environments which attack assets that we
want to protect, and we build the diagrams of
security use cases and misuse cases for mobile
grid environments considering these assets, threats
and attacks.
B. Secure Mobile Grid
System Analysis Activity
The analysis activity is based on use cases in which
we define the behaviour, actions and interactions
with those implied by the system (actors) to obtain
a first approach to the needs and requirements
(functional and non-functional) of the system to be
constructed. This activity is supported by reposi-
tories in which several types of elements appear:
Firstly, the elements that have been developed in
earlier stages; secondly, those that have been built
at the beginning of the process and finally, those
that come from other executions of the process
from which we have obtained elements that can
be reused by other applications. Reuse is appro-
priate here thanks both to the common features
of applications based on Grid computing (CPU
intensive, data intensive, collaborative and so on)
and to the fact that these applications use mobile
devices. Therefore, we must abstract all the com-
mon features (by analyzing the main features of
Grid applications and constructing, for example,
Search WWH ::




Custom Search