Essays about: "Domain-Specific Modeling"

Showing result 6 - 10 of 26 essays containing the words Domain-Specific Modeling.

  1. 6. Model-driven development for Microservices : A domain-specific modeling language for Kubernetes

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Daniel Johansson; [2022]
    Keywords : model-driven development; microservices; domain-specific modeling language; DSML; Kubernetes;

    Abstract : In the digital age that we live in today, we are dependent on numerous web applications or services, from dealing with banking, booking air flights, and handling our taxes. We expect these applications and services to support high availability, data loss prevention, and fast response time. READ MORE

  2. 7. Achieving Full Attack Coverage and Compiling Guidelines for enterpriseLang

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Joshua Sadiq; Anton Hagelberg; [2021]
    Keywords : Threat Modeling; Cyber Security; Domain Specific Language; Meta Attack Language; enterpriseLang;

    Abstract : As the number of digital systems grows yearly, thereis a need for good cyber security. Lack of such security can beattributed to the demand on resources or even knowledge. To fillthis gap, tools such as enterpriseLang can be used by the enduserto find flaws within his system, which he can revise. READ MORE

  3. 8. Validating enterpriseLang : A Domain- Specific Language Derived from the Meta Attack Language Framework

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Isak Nordgren; Anton Sederlin; [2021]
    Keywords : Attack Simulations; Threat Modeling; Cyber Security; Enterprise Systems; Attacksimuleringar; Hotmodellering; Cybersäkerhet; Företagssystem;

    Abstract : Enterprise data systems are continuously growing in complexity and size. The attack area of these systems has increased and introduced new vulnerabilities a potential adversary could exploit. Evaluating cyber security in enterprise IT infrastructure is difficult and expensive. READ MORE

  4. 9. Automated security analysis of a SCADA system

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Akzharkyn Duisembiyeva; [2020]
    Keywords : threat modeling; DSL; MAL; cyber security; SCADA; hotmodellering; DSL; MAL; cybersäkerhet; SCADA;

    Abstract : Supervisory control and data acquisition (SCADA) is a computer system for analysing, and monitoring data, as well as, controlling a plant in industries such as power grids, oil, gas refining, and water control. SCADA belongs to the category of critical systems that are needed to maintain the infrastructure of cities and households. READ MORE

  5. 10. StackLang : Automatic Attack Simulations Against the OpenStack Cloud Environment

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sara Rosander; [2020]
    Keywords : ;

    Abstract : Cloud computing is a fast-emerging technology. It is an attractive system for companies and has been embraced by many due to its benefits of economy, reliability, scalability, and guaranteed quality of service. Due to the increasing use of cloud platforms, it is important to be able to ensure its security. READ MORE