The search functionality is under construction.

Author Search Result

[Author] Xiaohu YANG(3hit)

1-3hit
  • Security Violation Detection for RBAC Based Interoperation in Distributed Environment

    Xinyu WANG  Jianling SUN  Xiaohu YANG  Chao HUANG  Di WU  

     
    PAPER-Access Control

      Vol:
    E91-D No:5
      Page(s):
    1447-1456

    This paper proposes a security violation detection method for RBAC based interoperation to meet the requirements of secure interoperation among distributed systems. We use role mappings between RBAC systems to implement trans-system access control, analyze security violation of interoperation with role mappings, and formalize definitions of secure interoperation. A minimum detection method according to the feature of RBAC system in distributed environment is introduced in detail. This method reduces complexity by decreasing the amount of roles involved in detection. Finally, we analyze security violation further based on the minimum detection method to help administrators eliminate security violation.

  • Improving Natural Language Requirements Quality Using Workflow Patterns

    Ye WANG  Xiaohu YANG  Cheng CHANG  Alexander J. KAVS  

     
    PAPER-Software Engineering

      Vol:
    E96-D No:9
      Page(s):
    2065-2074

    Natural language (NL) requirements are usually human-centric and therefore error-prone and inaccurate. In order to improve the 3Cs of natural language requirements, namely Consistency, Correctness and Completeness, in this paper we propose a systematic pattern matching approach supporting both NL requirements modeling and inconsistency, incorrectness and incompleteness analysis among requirements. We first use business process modeling language to model NL requirements and then develop a formal language — Workflow Patterns-based Process Language (WPPL) — to formalize NL requirements. We leverage workflow patterns to perform two-level 3Cs checking on the formal representation based on a coherent set of checking rules. Our approach is illustrated through a real world financial service example — Global Equity Trading System (GETS).

  • Feature Location in Source Code by Trace-Based Impact Analysis and Information Retrieval

    Zhengong CAI  Xiaohu YANG  Xinyu WANG  Aleksander J. KAVS  

     
    PAPER-Software System

      Vol:
    E95-D No:1
      Page(s):
    205-214

    Feature location is to identify source code that implements a given feature. It is essential for software maintenance and evolution. A large amount of research, including static analysis, dynamic analysis and the hybrid approaches, has been done on the feature location problems. The existing approaches either need plenty of scenarios or rely on domain experts heavily. This paper proposes a new approach to locate functional feature in source code by combining the change impact analysis and information retrieval. In this approach, the source code is instrumented and executed using a single scenario to obtain the execution trace. The execution trace is extended according to the control flow to cover all the potentially relevant classes. The classes are ranked by trace-based impact analysis and information retrieval. The ranking analysis takes advantages of the semantics and structural characteristics of source code. The identified results are of higher precision than the individual approaches. Finally, two open source cases have been studied and the efficiency of the proposed approach is verified.