CS 5150 1 CS 5150 Software Engineering Lecture 18 Program Design 3.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

Software Requirements
1 CS 501 Spring 2005 CS 501: Software Engineering Lecture 21 Reliability 3.
Object-Oriented Application Development Using VB.NET 1 Chapter 5 Object-Oriented Analysis and Design.
Access Control Methodologies
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Introduction To System Analysis and Design
CS 501: Software Engineering Fall 2000 Lecture 14 System Architecture I Data Intensive Systems.
The Architecture Design Process
1 CS 501 Spring 2007 CS 501: Software Engineering Lecture 16 Object Oriented Design 2.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 18 Object Oriented Design II.
CS 501: Software Engineering Fall 2000 Lecture 16 System Architecture III Distributed Objects.
CS CS 5150 Software Engineering Lecture 24 Reliability 4.
1 CS 501 Spring 2008 CS 501: Software Engineering Lecture 16 Object Oriented Design 2.
CS 501: Software Engineering Fall 2000 Lecture 11 Object-Oriented Design I.
Software Requirements
Criteria for good design. aim to appreciate the proper and improper uses of inheritance and appreciate the concepts of coupling and cohesion.
CS CS 5150 Software Engineering Lecture 13 System Architecture and Design 1.
Introduction to Databases Transparencies
1 CS 501 Spring 2007 CS 501: Software Engineering Lecture 20 Reliability 2.
Feb. 23, 2004CS WPI1 CS 509 Design of Software Systems Lecture #5 Monday, Feb. 23, 2004.
1 CS 501 Spring 2006 CS 501: Software Engineering Lecture 20 Reliability 2.
CS 501: Software Engineering Fall 2000 Lecture 13 Object-Oriented Design III.
Introductory case study. 2 The problem The most difficult part of any design project is understanding the task you are attempting You have been contacted.
1 CS 501 Spring 2005 CS 501: Software Engineering Lecture 16 Object Oriented Design 2.
CS 501: Software Engineering Fall 2000 Lecture 15 System Architecture II Distributed and Real Time Systems.
CS CS 5150 Software Engineering Lecture 16 Object Oriented Design 2.
CS CS 5150 Software Engineering Lecture 19 Reliability 1.
1 CS 501 Spring 2002 CS 501: Software Engineering Lecture 16 Object Oriented Design I.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 5 Slide 1 Requirements engineering l The process of establishing the services that the.
Software Engineering Case Study Slide 1 Introductory case study.
The Design Discipline.
Systems Analysis and Design in a Changing World, Fifth Edition
1 CS 456 Software Engineering. 2 Contents 3 Chapter 1: Introduction.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 6 Slide 1 Software Requirements.
An Introduction to Software Architecture
CSE 303 – Software Design and Architecture
CS CS 5150 Software Engineering Lecture 18 Security.
CS 501: Software Engineering Fall 1999 Lecture 18 (a) Project Reports (b) Object-Oriented Design III.
Software Requirements Presented By Dr. Shazzad Hosain.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 20 Object-Oriented.
CS 360 Lecture 9.  The security goal:  To make sure that agents (people or external systems) who interact with a computer system, its data and resources,
CS CS 5150 Software Engineering Lecture 17 Object Oriented Design 3.
Introduction To System Analysis and Design
1 CS 501 Spring 2006 CS 501: Software Engineering Lecture 17 Object Oriented Design 3.
CS CS 5150 Software Engineering Lecture 13 System Architecture and Design 1.
Systems Analysis and Design in a Changing World, 3rd Edition
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
CS 360 Lecture 10.  Software is expensive.  Most software development makes extensive use of existing software.  Developers avoid building new software.
Software Engineering Lecture 8 Object-Oriented Analysis.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
CS 5150 Software Engineering Lecture 17 Program Design 4/ Security & Privacy.
Software Engineering, COMP201 Slide 1 Software Requirements BY M D ACHARYA Dept of Computer Science.
CS 501: Software Engineering Fall 1999 Lecture 15 Object-Oriented Design I.
Legacy Systems and Software Reuse CS 560. Economics Software is expensive.  Most software development makes extensive use of existing software.  Developers.
CS 501: Software Engineering Fall 1999 Lecture 22 (a) Managing the Software Process (b) Software Reuse.
Security Issues CS 560. Security in the software development process The security goal:  To make sure that agents (people or external systems) who interact.
11 Systems Analysis and Design in a Changing World, Fifth Edition.
1 Software Requirements Descriptions and specifications of a system.
1 CS 501 Spring 2002 CS 501: Software Engineering Lecture 15 System Architecture III.
CS 501: Software Engineering Fall 1999 Lecture 23 Design for Usability I.
CS 325: Software Engineering
Presentation on Software Requirements Submitted by
Part 3 Design What does design mean in different fields?
CS 501: Software Engineering
CS 501: Software Engineering
An Introduction to Software Architecture
Design Yaodong Bi.
Chapter 6: Architectural Design
Presentation transcript:

CS CS 5150 Software Engineering Lecture 18 Program Design 3

CS Administration November 24 No class

CS Topics for Presentation Every project is different, but here are some suggestions: General topics for every project A precise description of what you have agreed to deliver to your client (a shared definition of success). Summary of progress since last presentation. Test plan and test cases. Discussion of unexpected events and risks. Overview of plan to complete and deliver the project. Topics that apply to many projects Results of user testing (if usability is important). Technical issues (if you have a technical client). A demonstration is always welcome.

CS UML Notation for Classes and Objects ClassesObjects AnyClass attribute1 attribute2 operation1() operation2() AnyClass or anObject:AnyClass :AnyClass anObject The names of objects are underlined. or

CS Notation: Active Class EventManager eventlist suspend() flush() An active class is a class whose objects own one or more processes or threads and therefore can initiate control activity. When instantiated, the class controls its own execution, rather than being invoked or activated by other objects.

CS Modeling Dynamic Aspects of Systems Interaction diagrams: set of objects and their relationships including messages that may be dispatched among them Sequence diagrams: time ordering of messages

CS Interaction: Informal Bouncing Ball Diagrams Example: execution of Client Servers domain name service TCP connection HTTP get

CS Notation: Interaction display An interaction is a behavior that comprises a set of messages exchanged among a set of objects within a particular context to accomplish a specific purpose.

CS Actions on Objects call return send create object destroy object returnCopy(c) okToBorrow()local status notifyReturn(b)asynchronous signal > stereotypes

CS Sequence Diagram: Borrow Copy of a Book BookBorrower libMem: LibraryMember theCopy:Copy theBook:Book borrow(theCopy) okToBorrow borrow In this diagram, time runs downwards

CS Sequence Diagram: Change in Cornell Program Cornellian :MEngStudent 1 : getName() sequence numbers added to messages :PhDStudent 1.1 : name 2: > PhDStudent(name) 3: >

CS Sequence Diagram: Painting Mechanism :Thread:Toolkit:ComponentPeertarget:HelloWorld run callbackLoop handleExpose paint

CS Software Reuse It is often good to design a program to reuse existing software. This can lead to better software at lower cost. Potential benefits of reuse Reduced development time and cost Improved reliability of mature components Shared maintenance cost Potential disadvantages of reuse Difficulty in finding appropriate components Components may be a poor fit for application Quality control and security may be unknown

CS Software Reuse: Examples System software device drivers file systems exception handling network protocols Subsystems database management systems firewalls web servers

CS Software Reuse Examples (Tools) Standard functions mathematical methods formatting User interface toolkits (e.g. Motif graphics toolkit) class libraries, (e.g., Swing for Java)

CS Design for Reuse: Application Packages Application package Supports a standard application (e.g., payroll) Functionality can be enhanced by: Configuration parameters (e.g., table driven) Extensibility at defined interfaces Custom written source code

CS Reuse and Object Oriented Languages: Class Hierarchies Example: Java Java is a relatively straightforward language with a very rich set of class hierarchies. Java programs derive much of their functionality from standard classes Learning and understanding the classes is difficult. Experienced Java programmers can write complex systems quickly Inexperienced Java programmers write inelegant and buggy programs

CS Design for Reuse: Inheritance and Abstract Classes Classes can be defined in terms of other classes using inheritance. The generalization class is called the superclass and the specialization is called the subclass. If the inheritance relationship serves only to model shared attributes and operations, i.e., the generalization is not intended to be implemented, the class is called an abstract class

CS Design for Reuse: Specification Inheritance Specification Inheritance The classification of concepts into type hierarchies, so that an object from a specified class can be replaced by an object from one of its subclasses. In particular: Pre conditions cannot be strengthened in a subclass. Post conditions cannot be weakened in a subclass.

CS Design for Reuse: Specification Inheritance Liskov Substitution Principle (strict inheritance) If an object of type S can be substituted in all the places where an object of type T is expected, then S is a subtype of T. Interpretation The Liskov Substitution Principle means that if all classes are subtypes of their superclasses, all inheritance relationships are specification inheritance relationships. New subclasses of T can be added without modifying the methods of T. This leads to an extensible system.

CS Design for Reuse: Delegation Delegation A class is said to delegate to another class if it implements an operation by resending a message to another class. Delegation is an alternative to inheritance that should be used when reuse is anticipated. For a discussion of design for reuse see the book by Bruegge and Dutoit in the readings.

CS Reuse: Design for Replacement of Components The software design should anticipate possible changes in the system over its life-cycle. New vendor or new technology Components are replaced because its supplier goes out of business, ceases to provide adequate support, increases its price, etc., or because better software from another sources provides better functionality, support, pricing, etc. This can apply to either open-source or vendor-supplied components.

CS Reuse: Design for Replacement of Components New implementation The original implementation may be problematic, e.g., poor performance, inadequate back-up and recovery, difficult to trouble-shoot, or unable to support growth and new features added to the system. Example. The portal nsdl.org was originally implemented using uPortal. This did not support important extensions that were requested and proved awkward to maintain. It was reimplemented using PHP/MySQL.

CS Reuse: Design for Replacement of Components Additions to the requirements When a system goes into production, it is usual to reveal both weaknesses and opportunities for extra functionality and enhancement to the user interface design. For example, in a data-intensive system it is almost certain that there will be requests for extra reports and ways of viewing the data. Requests for enhancements are often the sign of a successful system. Clients recognize latent possibilities.

CS Reuse: Design for Replacement of Components Changes in the application domain Most application domains change continually, e.g., because of business opportunities, external changes (such as new laws), mergers and take-overs, new groups of users, etc., etc., It is rarely feasible to implement a completely new system when the application domain changes. Therefore existing systems must be modified. This may involve extensive restructuring, but it is important to reuse existing code as much as possible.

CS Security in the Software Development Process The security goal The security goal is to make sure that the agents (people or external systems) who interact with a computer system, its data, and its resources, are those that the owner of the system would wish to have such interactions. Security considerations need to be part of the entire software development process. They may have a major impact on the architecture chosen. Example. Integration of Internet Explorer into Windows

CS Agents and Components A large system will have many agents and components: each is potentially unreliable and insecure components acquired from third parties may have unknown security problems commercial off-the-shelf (COTS) problem The software development challenge: develop secure and reliable components protect whole system so that security problems in parts of it do not spread to the entire system

CS Techniques: Barriers Place barriers that separate parts of a complex system: Isolate components, e.g., do not connect a computer to a network Firewalls Require authentication to access certain systems or parts of systems Every barrier imposes restrictions on permitted uses of the system Barriers are most effective when the system can be divided into subsystems with simple boundaries

CS Barriers: Firewall Public network Private network Firewall A firewall is a computer at the junction of two network segments that: Inspects every packet that attempts to cross the boundary Rejects any packet that does not satisfy certain criteria, e.g., an incoming request to open a TCP connection an unknown packet type Firewalls provide security at a loss of flexibility and a cost of system administration.

CS Techniques: Authentication & Authorization Authentication establishes the identity of an agent: What does the agent know (e.g., password)? What does the agent possess (e.g., smart card)? Where does the agent have physical access to (e.g., crt-alt-del)? What are the physical properties of the agent (e.g., fingerprint)? Authorization establishes what an authenticated agent may do: Access control lists Group membership

CS Example: An Access Model for Digital Content Digital material Attributes User Roles Actions Operations Access Policies

CS Techniques: Encryption Allows data to be stored and transmitted securely, even when the bits are viewed by unauthorized agents Private key and public key Digital signatures Encryption Decryption X Y Y X

CS Security and People People are intrinsically insecure: Careless (e.g, leave computers logged on, leave passwords where others can read them) Dishonest (e.g., stealing from financial systems) Malicious (e.g., denial of service attack) Many security problems come from inside the organization: In a large organization, there will be some disgruntled and dishonest employees Security relies on trusted individuals. What if they are dishonest?

CS Design for Security: People Make it easy for responsible people to use the system (e.g., make security procedures simple) Make it hard for dishonest or careless people (e.g., password management) Train people in responsible behavior Test the security of the system thoroughly and repeatedly, particularly after changes Do not hide violations

CS Programming Secure Software Programs that interface with the outside world (e.g., Web sites) need to be written in a manner that resists intrusion. For the top 25 programming errors, see: Common Weakness Evaluation: A Community-Developed Dictionary of Software Weakness Types. Insecure Interaction Between Components Risky Resource Management Porous Defenses Project management must ensure that all programs avoid these errors.

CS Programming Secure Software The following list is from the SANS Security Institute, Essential Skills for Secure Programmers Using Java/JavaEE, Input Handling Authentication & Session Management Access Control (Authorization) Java Types & JVM Management Application Faults & Logging Encryption Services Concurrency and Threading Connection Patterns

CS Suggested Reading Trust in Cyberspace, Committee on Information Systems Trustworthiness, National Research Council (1999) Fred Schneider, Cornell Computer Science, was the chair of this study.