Events

SenSe Events

Dr. Konstantinos Angelopoulos – Secure and Dependable Software Systems Research Cluster

University of Brighton

 

Self-adaptive software systems monitor their operation and adapt when their requirements fail due to unexpected phenomena in their environment. This work examines the case where the environment changes dynamically over time and the chosen adaptation has to take into account such changes. In Control Theory, this type of adaptation is known as Model Predictive Control and comes with a well-developed theory and myriads of successful applications. In particular our work focuses on modelling the dynamic relationship between requirements and possible adaptations. It then proposes a controller that exploits this relationship to optimize the satisfaction of requirements relative to a cost-function. This is accomplished through a model-based framework for designing self-adaptive software systems that can guarantee a certain level of requirements satisfaction over time, by dynamically composing adaptation strategies when necessary. The proposed framework is illustrated and evaluated through a simulation of the Meeting-Scheduling System exemplar.

 

 

Engineering Self-Adaptive Systems: A Control Theoretic Approach (27/09/2016)

 

 

Nikos Argyropoulos – Secure and Dependable Software Systems Research Cluster

University of Brighton

 

Security is a critical aspect of the business processes utilised by organisations to produce value. To avoid the harmful impact of security shortcomings, organisations should take it into consideration during the early process design stages and align it with their overall strategy. Flexibility and adaptability of the produced process designs are also desired, as a result of the volatile environment in which business process operate. To cover such needs we propose a framework for the derivation of secure business process designs by creating hybrid reference models from which process models can be instantiated. Such hybrid models are generated from high level goal models to ensure strategic alignment and provide linkage between the organisational strategy and the operational level. They can then be instantiated to a number of di fferent process designs, which fi t speci c situational security needs.

Designing Secure Business Processes from Organisational Goal Models (08/09/2016)

 

 

 

Speakers:

Jennifer Horkoff (City University)

Yijun Yu (Open University)

Alexei Lisitsa (Liverpool University)

Afnan Alsubaihin (University College London)

Nikos Argyropoulos (University of Brighton)

Raian Ali / Shamal Faily (Bournemouth University)

Christos Kalloniatis (University of the Aegean)

John Mylopoulos (University of Trento)

 

The Royal Academy of Engineering Workshop (15/01/2016)

 

 

Prof. John Mylopoulos – Royal Academy of Engineering Distinguished Visiting Fellow

University of Trento

 

Adaptive systems usually operationalize adaptation through a feedback loop, an architectural prosthesis that introduces monitoring, diagnosis and compensation functions to the system proper. We have been studying the requirements that lead to such feedback loop functionality. In particular, we have introduced new classes of requirements, called respectively awareness and evolution requirements, which are best operationalized through feedback loops instead of collections of functions. These requirements are characterized by the fact that they refer to other requirements, quality constraints or domain assumptions. We then discuss elicitation, modeling, formalization for awareness and evolution requirements and how to go from such requirements to feedback loops through a systematic process. In addition, we sketch a framework for monitoring, diagnosis and compensation grounded on requirements models.

This is joint work with Vitor Souza (UFES Brazil), Kostas Angelopoulos (UniTN Italy) and Alexei Lapouchnian (UToronto Canada).

 

 

Designing Adaptive Software Systems: A Requirements Engineering Perspective (06/05/2015)

 

 

Dr. Christos Kloukinas - City University

The software architecture community has developed a number of different languages (ADLs) for describing architectures of systems, with different goals and characteristics. Some work we did on protocol choreography realization made us revisit

the early decisions around the connector basic notion, used by ADLs for representing protocols. We believe that while the initial drive behind connectors so as to increase modularity and reuse in specs is correct, their treatment so far by the community has ignored the protocol realizability issue (and isn't as modular as it should be either). We have developed the first version of a new language (Xcd), which attempts to rectify this. At the same time, Xcd should make it easier for practitioners to write formal specs, as it is extending the design-by-contract approach for component-based systems and making specs look more like a usual programming language.

 

For more information on Xcd, please visit: http://staff.city.ac.uk/c.kloukinas/Xcd/index.html

Specifying Software Architectures - Revisiting The Early Decisions (22/04/2015)

 

 

Dr. Raian Ali - Bournemouth University

The talk will present our works on different threads of research in which requirements-driven software adaptation is a main focus. We study the concept of Social Adaptation as a way to enable a democratic-like adaptation in socio-technical systems. We develop systematic approaches for the gathering and aggregation of feedback from users, and the decision on how adaptation should respond to that feedback. We also study the effect of context on the meaning of requirements and failures, thus dependability, and add a pragmatic dimension to the literature in requirements-driven adaptation.

In addition, we are investigating how to model two social concepts and their inter-relations with a socio-technical system aiming for a richer adaptation and decision making processes. The first relates to transparency as a requirement or a meta-requirement of the inter-dependent actors of a socio-technical system. The second relates to motivation as a supplementary requirement to aid better performance and behavioural change. We investigate rigorous approaches to introduce software-based motivation consistently with the systems actors’ functional and non-functional requirements.

In another thread of research we study the phenomenon of Digital Addiction and how to engineer addiction-aware software which enjoys a degree of autonomy in detecting and adapting to addictive behaviour styles and capable to facilitate social interactions to aid users adjusting their usages of addictive software, e.g. social networks and games.

 

Requirements –Driven Social Adaption (11/03/2015)

 

 

Prof. John Howse - University of Brighton

Diagrammatic logics developed at Brighton have been used in modelling privacy engineering processes at Nokia. The notations developed are mathematically precise but are accessible to end users. Use of the diagrammatic notations allowed the various stakeholders involved in the development of Nokia’s privacy processes, software engineers, lawyers, marketing people, managers, to communicate technical details accurately and effectively. This talk gives an overview of the diagrammatic logics involved, particularly concept diagrams, and considers their role in privacy engineering at Nokia. Concept diagrams were designed to model ontologies and the talk will also discuss other ontologies developed using the notation.

 

Visual Modelling and Privacy Engineering (11/02/2015)

 

 

Dr. Amel Bennaceur - Open University UK

 

Security is concerned with the protection of assets from intentional harm. Secure systems provide capabilities that enable such protection to satisfy some security requirements. In a world increasingly populated with mobile and ubiquitous computing technology, the scope and boundary of security systems can be uncertain and can change. A single functional component, or even multiple components individually, are often insufficient to satisfy complex security requirements on their own.

Collaborative security aims at leveraging ubiquitous computing technology by exploiting the capabilities of the various components available in the operating environment and composing them to meet security requirements despite changes in the environment, changes in assets under protection and their values, and the discovery of new threats and vulnerabilities.

I will describe a framework for collaborative security that enables us: (1) to capture, represent, and reason about the capabilities of different software components and their operational context, and (2) to select and mediate these components at runtime in order to satisfy the security requirements.

I will illustrate the approach through a collaborative robotic implementation.

 

 

Requirements-Driven Mediation for Collaborative Security - Can your vacuum cleaner protect your home? (21/01/2015)

 

 

Electronic health records: interdisciplinary research and opportunities (03/12/2014)

 

 

 

Prof. Jackie Cassell - Brighton and Sussex Medical School

 

 

 

 

Security Requirements Engineering (19/11/2014)

 

 

Prof. Haris Mouratidis - University of Brighton

 

 

 

 

Dr. Michalis Pavlidis - University of Brighton

 

 

 

 

Trust Engineering (26/11/2014)