Evaluation of the ALCA Project Workshop Group 1  Jeffrey Schott  Bhavana Mungara  Kiran Bojja  Sri Harsha Meda.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Questions with 2nd Request Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Advertisements

MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Institute for Cyber Security
ATAM Architecture Tradeoff Analysis Method
Technical and design issues in implementation Dr. Mohamed Ally Director and Professor Centre for Distance Education Athabasca University Canada New Zealand.
Client Principal in the wild
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Module 2 Designing a Logical Database Model. Module Overview Guidelines for Building a Logical Database Model Planning for OLTP Activity Evaluating Logical.
Database Management System
Systems Analysis and Design in a Changing World, 6th Edition
Conner Hansen Alex Summer Andreas Floeck Safe Message System.
A Guide to SQL, Seventh Edition. Objectives Create a new table from an existing table Change data using the UPDATE command Add new data using the INSERT.
Configuration Management CS 415, Software Engineering I Mark Ardis, Rose-Hulman Institute February 4, 2003.
The Architecture Design Process
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 4: Integrity and security.
View Sen Zhang. Views are very common in business systems users view of data is simplified a form of security - user sees only the data he/she needs to.
Software Testing and Quality Assurance
Week:#14 Windows Recovery
Software Architecture Quality. Outline Importance of assessing software architecture Better predict the quality of the system to be built How to improve.
File Management Chapter 12.
Evaluating Architectures Quality control: rarely fun, but always necessary
Cooperating Teachers: How to Reset Your Password in Tk20 Use this after your initial account set up if you cannot remember your TK20 password.
Microsoft ® Official Course Module 7 Configuring File Access and Printers on Windows ® 8 Clients.
Architecture Tradeoff Analysis Method Based on presentations by Kim and Kazman
Object-Oriented Analysis and Design
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
Transactions and Reliability. File system components Disk management Naming Reliability  What are the reliability issues in file systems? Security.
Meal Menu Application Nabil Allataifeh. Preview The program is an application that can be used to search for meals and restaurants in a very friendly.
Commercial Database Applications Testing. Test Plan Testing Strategy Testing Planning Testing Design (covered in other modules) Unit Testing (covered.
File Management Chapter 12. File Management File management system is considered part of the operating system Input to applications is by means of a file.
Lesson 7 Guide for Software Design Description (SDD)
MDECA SECURITY UPDATES Update & Review for Security Changes!
Managing Software Quality
An Object-Oriented Approach to Programming Logic and Design
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
7202ICT – Database Administration
Getting to Grips with Assignments Bronze Level – Compulsory.
Critical Host Database Overview. Critical Host Definition The current policy (which is being updated as we speak) defines a Critical Host as: The current.
Adaptive Learning Class Assistant (ALCA) CS551 Proposal The Zombies Group Dhananjay Indurkar Jingyuan Zhang Joshua Eastep Gaye Hattem Nan Zhang Wei Shao.
Team # 2 Members: Sowmya Krishnaswamy Hakan Terzioglu Manu Mehan Jerome Tunaya.
Reusable and Multiple Actions USINGQTP65-STUDENT-01A.
Securing Sensitive Information Data Security Dashboards often contain the most important data in the company Securing that information makes business.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Software Architecture Evaluation Methodologies Presented By: Anthony Register.
Evaluating Architectures. Quality Control Rarely fun, but always necessary 1.
Division of Risk Management State of Florida Loss Prevention Program.
Evaluating the JBoss Application Server Architecture By Yichuan CaoSupervisor: Eleni Stroulia April 22, 2004.
John D. McGregor Architecture Evaluation
The Registration Alert System LCA Overview. Overview The Registration Alert System (RAS) is web-based software package that allows University of Washington.
What the $#*! IS my password? Secure Online Password Storage Lon Smith Aaron Gremmert.
Scheduler CSE 403 Project SDS Presentation. What is our project? We are building a web application to manage user’s time online User comes to our webpage.
1 Turnitin in BUMoodle - Quick Reference Guide for Staff (This quick guide is a modified version of the one prepared by ITO/ITSC.) Turnitin Standard online.
The ATAM method. The ATAM method (1/2) Architecture Tradeoff Analysis Method Requirements for complex software systems Modifiability Performance Security.
Quality Attribute Workshop. Goal: To identify requirements Held early in development Includes stakeholders Outputs: Business Goals Quality Attribute Scenarios.
Introduction to Android Programming. Features of Android.
Database Recovery Techniques
Database Recovery Techniques
PearsonAccess EOC Training
Software Architecture ATAM Process Presentation
Using E-Business Suite Attachments
CSE 403 Project SDS Presentation
How to Create and Start a Test Session
Student Access Center Go to
Managing Sessions in PearsonAccessnext
Managing Sessions in PearsonAccessnext
Managing Sessions in PearsonAccessnext
Managing Sessions in PearsonAccessnext
Managing Sessions in PearsonAccessnext
Math Sports Final Release Bridger.
Managing Sessions in PearsonAccessnext
Presentation transcript:

Evaluation of the ALCA Project Workshop Group 1  Jeffrey Schott  Bhavana Mungara  Kiran Bojja  Sri Harsha Meda

Presentation Overview  Overview of ALCA  What method for Evaluation?  Evaluation of ALCA Architecture  Additional features we propose  Analysis

Overview of ALCA  Purpose of ALCA  Features  Architecture Overview

Architectural Overview – Use Case Diagram

Architectural Overview - Sequence Diagram

Architectural Overview - Class Diagram

Evaluation Method  ATAM  Comparison with other evaluation methods

Evaluation of Architecture  Analysis of an existing component.  A function specified in the requirements but missing in the architecture.  Additional function to increase the reliability of the architecture.  Addition of a component to the architecture.

Scenario 1 : Single Sign-On  “UMKC single sign on is used to login”.  Key attributes that affect the architecture: –Performance –Reliability –Security –Modifiability  Sensitivity and Tradeoff points  Analysis –Performance → Only have to login Once –User Friendly –Security → Can’t access application unless logged in. –Modifiability → Changes to the application do not affect single sign on.

Scenario 2 :Update Grades  “ Teachers will be able to override the system assigned grade”. Original View : Changes Made:

Scenario 2 :Update Grades (contd.)  Key attributes that affect the architecture: –Performance –Reliability  Sensitivity and Tradeoff points  Analysis –Performance & Reliability → Overcome incorrect grading algorithm → Overcome incorrect grading algorithm → Overcome incorrect grading keys. → Overcome incorrect grading keys.

Scenario 3 : Test Lock  Why Test Lock? Changes made:

Scenario 3 :Test Lock (contd.)  Key attributes that affect the architecture: –Performance –Reliability –Security –Modifiability  Sensitivity and Tradeoff points  Analysis –Performance & Reliability → Accurate reflection of student performance → Accurate reflection of student performance –Security → Increase test security for teachers-students cannot retake the same test. → Increase test security for teachers-students cannot retake the same test. –Modifiability → Allows for addition of test cancellation function.  Good for Traditional and bad for Adaptive

Scenario 4: Cache DB  Saving test progress to resume a test to resume a test  Requirement fulfilled by a Cache Database

Scenario 4 :Cache DB (contd.)  Key attributes that affect the architecture: –Performance –Reliability  Sensitivity and Tradeoff points  Analysis –Performance & Reliability → Recover from system crashes → Recover from system crashes → Prevents exhaustion of limited number of tests. → Prevents exhaustion of limited number of tests.  Good for Adaptive and Bad for Traditional

Questions