SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Boström Gustav) "

Sökning: WFRF:(Boström Gustav)

  • Resultat 1-16 av 16
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  •  
3.
  •  
4.
  • Boström, Gustav, et al. (författare)
  • Aspects in the Agile Toolbox
  • 2005
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • The introduction of agile methodologies promises faster time to market and a flexible, customer-driven software development process. The flexibility with regards to requirements can however also be a risk if new non-functional requirements need to be implemented late in a software development project. In this article we argue that aspect-oriented programming is a technique that can mitigate this risk by providing the means to deal with non-functional, crosscutting requirements. The suggested solution is illustrated by an example where new requirements in the form of quality of service demands on an existing service are implemented by using aspect orientated programming.
  •  
5.
  •  
6.
  • Boström, Gustav (författare)
  • Database Encryption as an Aspect
  • 2004
  • Ingår i: AOSD'04 International Conference on Aspect-Oriented Software Development.
  • Konferensbidrag (refereegranskat)abstract
    • Encryption is an important method for implementing confidentiality in information systems. Unfortunately applying encryption effectively can be quite complicated. Encryption, as well as other security concerns, is also often spread out in an application making implementation difficult. This crosscutting nature of encryption makes it a potentially ideal candidate for implementation using AOP. In this article we provide an example of how database encryption was applied using AOP with AspectJ on a real-life healthcare database application. Although the attempt was promising with regards to modularity, amount of effort and security engineering, it also revealed problems related to substring queries that need to be solved to make the approach really useful.
  •  
7.
  • Boström, Gustav, et al. (författare)
  • Extending XP Practices to Support Security Requirements Engineering
  • 2006
  • Ingår i: Proceedings of Workshop on Software Engineering for Secure Systems (SESS’06), 28th International Conference of Software Engineering (ICSE’06), Shanghai, China.
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)
  •  
8.
  • Boström, Gustav, et al. (författare)
  • Quality of Service Evaluation in Virtual Organizations Using SLAs
  • 2006. - 1
  • Ingår i: 1st International Workshop on Interoperability Solutions to Trust, Security, Policies and QoS for Enhanced Enterprise Systems (IS-TSPQ 2006).
  • Konferensbidrag (refereegranskat)abstract
    • Cooperating in Virtual organizations requires trust between the constituting organizations. SLA contracts are put in place in order to specify the quality of service of services offered. For these contracts to be effective they also need to be monitored effectively. In a Service Oriented Architecture this often means monitoring Web service invocations and evaluating if the service fulfills the obligations in its SLA. In this paper we present an implementation of a rule engine based SLA Evaluator specifically designed for the needs of a virtual organization. The evaluator fits in the context of a virtual organization through the use of open XML-based standards and a loosely coupled, event-driven architecture.
  •  
9.
  • Boström, Gustav, 1973- (författare)
  • Simplifying development of secure software : Aspects and Agile methods
  • 2006
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Reducing the complexity of building secure software systems is an important goal as increased complexity can lead to more security flaws. This thesis aims at helping to reduce this complexity by investigating new programming techniques and software development methods for implementing secure software. We provide case studies on the use and effects of applying Aspect-oriented software development to Confidentiality, Access Control and Quality of Service implementation. We also investigate how eXtreme Programming can be used for simplifying the secure software development process by comparing it to the security engineering standards Common Criteria and the Systems Security Engineering Capability Maturity Model. We also explore the relationship between Aspect-oriented programming and Agile software development methods, such as eXtreme Programming.
  •  
10.
  • Henkel, Martin, et al. (författare)
  • Moving from internal to external services using aspects
  • 2006
  • Ingår i: Interoperability of Enterprise Software and Applications. - London : Springer. - 1846281512 ; , s. 301-310
  • Konferensbidrag (refereegranskat)abstract
    • Service oriented computing and web service technology provide the means to structure an organisation’s internal IT resources into a highly integrated network of services. In e-business and business process integration the internal services are interconnected with other, external organisations’ resources to form virtual organisations. This move from using services internally to external use puts new non-functional requirements on the service implementation. Without any supporting technologies, meeting these new requirements can result in re-writing or changing a large part of the service implementation. In this paper we argue that aspect oriented programming is an important technique that can be used to facilitate the implementation of the new requirements that arises when moving from internal to external services. The suggested solution is illustrated by an example where quality of service metrics is implemented by using aspect oriented programming.
  •  
11.
  • Henkel, Martin, et al. (författare)
  • Moving from Internal to External Services using Aspects
  • 2005
  • Ingår i: Proceedings of the First International Conference on Interoperability of Enterprise Software and Applications (INTEROP-ESA'05), Geneva, Switzerland.
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)
  •  
12.
  •  
13.
  • Lindberg, Gustav, et al. (författare)
  • Determination of thermodynamic properties of Na2S using solid-state EMF measurements
  • 2007
  • Ingår i: Journal of Chemical Thermodynamics. - : Elsevier. - 0021-9614 .- 1096-3626. ; 39:1, s. 44-48
  • Tidskriftsartikel (refereegranskat)abstract
    • To obtain reliable thermodynamic data for Na2S(s), solid-state EMF measurements of the cell Pd(s)|O2(g)|Na2S(s), Na2SO4(s)|YSZ| Fe(s), FeO(s)|O2(g)ref| Pd(s) were carried out in the temperature range 870 < T/K < 1000 with yttria stabilized zirconia as the solid electrolyte. The measured EMF values were fitted according to the equation Efit/V (±0.00047) = 0.63650 − 0.00584732(T/K) + 0.00073190(T/K) ln (T/K). From the experimental results and the available literature data on Na2SO4(s), the equilibrium constant of formation for Na2S(s) was determined to be lg Kf(Na2S(s)) (±0.05) = 216.28 − 4750(T/K)−1 − 28.28878 ln (T/K). Gibbs energy of formation for Na2S(s) was obtained as ΔfG(Na2S(s))/(kJ · mol−1) (±1.0) = 90.9 − 4.1407(T/K) + 0.5415849(T/K) ln (T/K). By applying third law analysis of the experimental data, the standard enthalpy of formation of Na2S(s) was evaluated to be ΔfH(Na2S(s), 298.15 K)/(kJ · mol−1) (±1.0) = −369.0. Using the literature data for Cp and the calculated ΔfH, the standard entropy was evaluated to S(Na2S(s), 298.15 K)/(J · mol−1 · K−1) (±2.0) = 97.0.
  •  
14.
  • Mårsell, Erik, et al. (författare)
  • Spatial Control of Multiphoton Electron Excitations in InAs Nanowires by Varying Crystal Phase and Light Polarization
  • 2018
  • Ingår i: Nano Letters. - : American Chemical Society (ACS). - 1530-6984 .- 1530-6992. ; 18:2, s. 907-915
  • Tidskriftsartikel (refereegranskat)abstract
    • We demonstrate the control of multiphoton electron excitations in InAs nanowires (NWs) by altering the crystal structure and the light polarization. Using few-cycle, near-infrared laser pulses from an optical parametric chirped-pulse amplification system, we induce multiphoton electron excitations in InAs nanowires with controlled wurtzite (WZ) and zincblende (ZB) segments. With a photoemission electron microscope, we show that we can selectively induce multiphoton electron emission from WZ or ZB segments of the same wire by varying the light polarization. Developing ab initio GW calculations of first to third order multiphoton excitations and using finite-difference time-domain simulations, we explain the experimental findings: While the electric-field enhancement due to the semiconductor/vacuum interface has a similar effect for all NW segments, the second and third order multiphoton transitions in the band structure of WZ InAs are highly anisotropic in contrast to ZB InAs. As the crystal phase of NWs can be precisely and reliably tailored, our findings open up for new semiconductor optoelectronics with controllable nanoscale emission of electrons through vacuum or dielectric barriers.
  •  
15.
  •  
16.
  • Wäyrynen, Jaana, et al. (författare)
  • Security engineering and eXtreme programming : An impossible marriage?
  • 2004
  • Ingår i: EXTREME PROGRAMMING AND AGILE METHODS - XP/ AGILE UNIVERSE 2004, PROCEEDINGS. - Berlin : Springer. ; , s. 117-128
  • Konferensbidrag (refereegranskat)abstract
    • Agile methods, such as eXtreme Programming (XP), have been criticised for being inadequate for the development of secure software. In this paper, we analyse XP from a security engineering standpoint, to assess to what extent the method can be used for development of security critical software. This is done by analysing XP in the light of two security engineering standards; the Systems Security Engineering-Capability Maturity Model (SSE-CMM) and the Common Criteria (CC). The result is that XP is more aligned with security engineering than one might think at first. However, XP also needs to be tailored to better support and to more explicitly deal with security engineering issues. Tailoring XP for secure software development, without removing the agility that is the trademark of agile methods, may be a solution that would make XP more compatible with current security engineering practices.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-16 av 16
Typ av publikation
konferensbidrag (10)
tidskriftsartikel (3)
annan publikation (1)
doktorsavhandling (1)
licentiatavhandling (1)
Typ av innehåll
refereegranskat (9)
övrigt vetenskapligt/konstnärligt (7)
Författare/redaktör
Boström, Gustav (10)
Henkel, Martin (4)
Wäyrynen, Jaana (4)
Nyfjord, Jaana (3)
Larsson, Anders (2)
Boström, Dan (2)
visa fler...
Lindberg, Gustav (2)
Backman, Rainer (2)
Nordin, Anders (2)
Bodén, Marine (2)
Råberg, Mathias (2)
Staron, Miroslaw, 19 ... (1)
Dick, Kimberly A. (1)
Olsson, Tomas (1)
Nylund, Gustav (1)
Lehmann, Sebastian (1)
Olsson, Olle (1)
Mikkelsen, Anders (1)
Verdozzi, Claudio (1)
Miranda, Miguel (1)
L'Huillier, Anne (1)
Mauritsson, Johan (1)
Grysell, Tomas, 1961 ... (1)
Arnold, Cord L. (1)
Guo, Chen (1)
Cheng, Yu Chen (1)
Giambiagi, Pablo (1)
Bergviken Rensfeldt, ... (1)
Boström, Emil (1)
Boström, Christopher ... (1)
Marén, Gustav (1)
Boström, Erik (1)
Beznosov, Konstantin (1)
Kruchten, Philippe (1)
Boström, Gustav, 197 ... (1)
Johanneson, Paul (1)
Lorek, Eleonora (1)
Harth, Anne (1)
Mårsell, Erik (1)
Stankovski, Martin (1)
Öberg, Gustav (1)
Sunnerstam, Maria (1)
Losquin, Arthur (1)
Rosén, Erik (1)
Lagergren, Fredrika, ... (1)
Warnqvist, Björn (1)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (7)
Stockholms universitet (4)
Umeå universitet (2)
Göteborgs universitet (1)
Uppsala universitet (1)
Lunds universitet (1)
visa fler...
RISE (1)
visa färre...
Språk
Engelska (13)
Svenska (1)
Latin (1)
Odefinierat språk (1)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (9)
Teknik (2)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy