Securing software development using developer access control
- Authors: Ongers, Grant
- Date: 2020
- Subjects: Computer software -- Development , Computers -- Access control , Computer security -- Software , Computer networks -- Security measures , Source code (Computer science) , Plug-ins (Computer programs) , Data encryption (Computer science) , Network Access Control , Data Loss Prevention , Google’s BeyondCorp , Confidentiality, Integrity and Availability (CIA) triad
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/149022 , vital:38796
- Description: This research is aimed at software development companies and highlights the unique information security concerns in the context of a non-malicious software developer’s work environment; and furthermore explores an application driven solution which focuses specifically on providing developer environments with access control for source code repositories. In order to achieve that, five goals were defined as discussed in section 1.3. The application designed to provide the developer environment with access control to source code repositories was modelled on lessons taken from the principles of Network Access Control (NAC), Data Loss Prevention (DLP), and Google’s BeyondCorp (GBC) for zero-trust end-user computing. The intention of this research is to provide software developers with maximum access to source code without compromising Confidentiality, as per the Confidentiality, Integrity and Availability (CIA) triad. Employing data gleaned from examining the characteristics of DLP, NAC, and Beyond- Corp—proof-of-concept code was developed to regulate access to the developer’s environment and source code. The system required sufficient flexibility to support the diversity of software development environments. In order to achieve this, a modular design was selected. The system comprised a client side agent and a plug-in-ready server component. The client side agent mounts and dismounts encrypted volumes containing source code. Furthermore, it provides the server with information of the client that is demanded by plug-ins. The server side service provided encryption keys to facilitate the mounting of the volumes and, through plug-ins, asked questions of the client agent to determine whether access should be granted. The solution was then tested with integration and system testing. There were plans to have it used by development teams who were then to be surveyed as to their view on the proof of concept but this proved impossible. The conclusion provides a basis by which organisations that develop software can better balance the two corners of the CIA triad most often in conflict: Confidentiality in terms of their source code against the Availability of the same to developers.
- Full Text:
- Date Issued: 2020
- Authors: Ongers, Grant
- Date: 2020
- Subjects: Computer software -- Development , Computers -- Access control , Computer security -- Software , Computer networks -- Security measures , Source code (Computer science) , Plug-ins (Computer programs) , Data encryption (Computer science) , Network Access Control , Data Loss Prevention , Google’s BeyondCorp , Confidentiality, Integrity and Availability (CIA) triad
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/149022 , vital:38796
- Description: This research is aimed at software development companies and highlights the unique information security concerns in the context of a non-malicious software developer’s work environment; and furthermore explores an application driven solution which focuses specifically on providing developer environments with access control for source code repositories. In order to achieve that, five goals were defined as discussed in section 1.3. The application designed to provide the developer environment with access control to source code repositories was modelled on lessons taken from the principles of Network Access Control (NAC), Data Loss Prevention (DLP), and Google’s BeyondCorp (GBC) for zero-trust end-user computing. The intention of this research is to provide software developers with maximum access to source code without compromising Confidentiality, as per the Confidentiality, Integrity and Availability (CIA) triad. Employing data gleaned from examining the characteristics of DLP, NAC, and Beyond- Corp—proof-of-concept code was developed to regulate access to the developer’s environment and source code. The system required sufficient flexibility to support the diversity of software development environments. In order to achieve this, a modular design was selected. The system comprised a client side agent and a plug-in-ready server component. The client side agent mounts and dismounts encrypted volumes containing source code. Furthermore, it provides the server with information of the client that is demanded by plug-ins. The server side service provided encryption keys to facilitate the mounting of the volumes and, through plug-ins, asked questions of the client agent to determine whether access should be granted. The solution was then tested with integration and system testing. There were plans to have it used by development teams who were then to be surveyed as to their view on the proof of concept but this proved impossible. The conclusion provides a basis by which organisations that develop software can better balance the two corners of the CIA triad most often in conflict: Confidentiality in terms of their source code against the Availability of the same to developers.
- Full Text:
- Date Issued: 2020
Towards a capability maturity model for a cyber range
- Authors: Aschmann, Michael Joseph
- Date: 2020
- Subjects: Computer software -- Development , Computer security
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/163142 , vital:41013
- Description: This work describes research undertaken towards the development of a Capability Maturity Model (CMM) for Cyber Ranges (CRs) focused on cyber security. Global cyber security needs are on the rise, and the need for attribution within the cyber domain is of particular concern. This has prompted major efforts to enhance cyber capabilities within organisations to increase their total cyber resilience posture. These efforts include, but are not limited to, the testing of computational devices, networks, and applications, and cyber skills training focused on prevention, detection and cyber attack response. A cyber range allows for the testing of the computational environment. By developing cyber events within a confined virtual or sand-boxed cyber environment, a cyber range can prepare the next generation of cyber security specialists to handle a variety of potential cyber attacks. Cyber ranges have different purposes, each designed to fulfil a different computational testing and cyber training goal; consequently, cyber ranges can vary greatly in the level of variety, capability, maturity and complexity. As cyber ranges proliferate and become more and more valued as tools for cyber security, a method to classify or rate them becomes essential. Yet while a universal criteria for measuring cyber ranges in terms of their capability maturity levels becomes more critical, there are currently very limited resources for researchers aiming to perform this kind of work. For this reason, this work proposes and describes a CMM, designed to give organisations the ability to benchmark the capability maturity of a given cyber range. This research adopted a synthesised approach to the development of a CMM, grounded in prior research and focused on the production of a conceptual model that provides a useful level of abstraction. In order to achieve this goal, the core capability elements of a cyber range are defined with their relative importance, allowing for the development of a proposed classification cyber range levels. An analysis of data gathered during the course of an expert review, together with other research, further supported the development of the conceptual model. In the context of cyber range capability, classification will include the ability of the cyber range to perform its functions optimally with different core capability elements, focusing on the Measurement of Capability (MoC) with its elements, namely effect, performance and threat ability. Cyber range maturity can evolve over time and can be defined through the Measurement of Maturity (MoM) with its elements, namely people, processes, technology. The combination of these measurements utilising the CMM for a CR determines the capability maturity level of a CR. The primary outcome of this research is the proposed level-based CMM framework for a cyber range, developed using adopted and synthesised CMMs, the analysis of an expert review, and the mapping of the results.
- Full Text:
- Date Issued: 2020
- Authors: Aschmann, Michael Joseph
- Date: 2020
- Subjects: Computer software -- Development , Computer security
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/163142 , vital:41013
- Description: This work describes research undertaken towards the development of a Capability Maturity Model (CMM) for Cyber Ranges (CRs) focused on cyber security. Global cyber security needs are on the rise, and the need for attribution within the cyber domain is of particular concern. This has prompted major efforts to enhance cyber capabilities within organisations to increase their total cyber resilience posture. These efforts include, but are not limited to, the testing of computational devices, networks, and applications, and cyber skills training focused on prevention, detection and cyber attack response. A cyber range allows for the testing of the computational environment. By developing cyber events within a confined virtual or sand-boxed cyber environment, a cyber range can prepare the next generation of cyber security specialists to handle a variety of potential cyber attacks. Cyber ranges have different purposes, each designed to fulfil a different computational testing and cyber training goal; consequently, cyber ranges can vary greatly in the level of variety, capability, maturity and complexity. As cyber ranges proliferate and become more and more valued as tools for cyber security, a method to classify or rate them becomes essential. Yet while a universal criteria for measuring cyber ranges in terms of their capability maturity levels becomes more critical, there are currently very limited resources for researchers aiming to perform this kind of work. For this reason, this work proposes and describes a CMM, designed to give organisations the ability to benchmark the capability maturity of a given cyber range. This research adopted a synthesised approach to the development of a CMM, grounded in prior research and focused on the production of a conceptual model that provides a useful level of abstraction. In order to achieve this goal, the core capability elements of a cyber range are defined with their relative importance, allowing for the development of a proposed classification cyber range levels. An analysis of data gathered during the course of an expert review, together with other research, further supported the development of the conceptual model. In the context of cyber range capability, classification will include the ability of the cyber range to perform its functions optimally with different core capability elements, focusing on the Measurement of Capability (MoC) with its elements, namely effect, performance and threat ability. Cyber range maturity can evolve over time and can be defined through the Measurement of Maturity (MoM) with its elements, namely people, processes, technology. The combination of these measurements utilising the CMM for a CR determines the capability maturity level of a CR. The primary outcome of this research is the proposed level-based CMM framework for a cyber range, developed using adopted and synthesised CMMs, the analysis of an expert review, and the mapping of the results.
- Full Text:
- Date Issued: 2020
Designing and prototyping WebRTC and IMS integration using open source tools
- Authors: Motsumi, Tebagano Valerie
- Date: 2018
- Subjects: Internet Protocol multimedia subsystem , Session Initiation Protocol (Computer network protocol) , Computer software -- Development , Web Real-time Communications (WebRTC)
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63245 , vital:28386
- Description: WebRTC, or Web Real-time Communications, is a collection of web standards that detail the mechanisms, architectures and protocols that work together to deliver real-time multimedia services to the web browser. It represents a significant shift from the historical approach of using browser plugins, which over time, have proven cumbersome and problematic. Furthermore, it adopts various Internet standards in areas such as identity management, peer-to-peer connectivity, data exchange and media encoding, to provide a system that is truly open and interoperable. Given that WebRTC enables the delivery of multimedia content to any Internet Protocol (IP)-enabled device capable of hosting a web browser, this technology could potentially be used and deployed over millions of smartphones, tablets and personal computers worldwide. This service and device convergence remains an important goal of telecommunication network operators who seek to enable it through a converged network that is based on the IP Multimedia Subsystem (IMS). IMS is an IP-based subsystem that sits at the core of a modern telecommunication network and acts as the main routing substrate for media services and applications such as those that WebRTC realises. The combination of WebRTC and IMS represents an attractive coupling, and as such, a protracted investigation could help to answer important questions around the technical challenges that are involved in their integration, and the merits of various design alternatives that present themselves. This thesis is the result of such an investigation and culminates in the presentation of a detailed architectural model that is validated with a prototypical implementation in an open source testbed. The model is built on six requirements which emerge from an analysis of the literature, including previous interventions in IMS networks and a key technical report on design alternatives. Furthermore, this thesis argues that the client architecture requires support for web-oriented signalling, identity and call handling techniques leading to a potential for IMS networks to natively support these techniques as operator networks continue to grow and develop. The proposed model advocates the use of SIP over WebSockets for signalling and DTLS-SRTP for media to enable one-to-one communication and can be extended through additional functions resulting in a modular architecture. The model was implemented using open source tools which were assembled to create an experimental network testbed, and tests were conducted demonstrating successful cross domain communications under various conditions. The thesis has a strong focus on enabling ordinary software developers to assemble a prototypical network such as the one that was assembled and aims to enable experimentation in application use cases for integrated environments.
- Full Text:
- Date Issued: 2018
- Authors: Motsumi, Tebagano Valerie
- Date: 2018
- Subjects: Internet Protocol multimedia subsystem , Session Initiation Protocol (Computer network protocol) , Computer software -- Development , Web Real-time Communications (WebRTC)
- Language: English
- Type: text , Thesis , Masters , MSc
- Identifier: http://hdl.handle.net/10962/63245 , vital:28386
- Description: WebRTC, or Web Real-time Communications, is a collection of web standards that detail the mechanisms, architectures and protocols that work together to deliver real-time multimedia services to the web browser. It represents a significant shift from the historical approach of using browser plugins, which over time, have proven cumbersome and problematic. Furthermore, it adopts various Internet standards in areas such as identity management, peer-to-peer connectivity, data exchange and media encoding, to provide a system that is truly open and interoperable. Given that WebRTC enables the delivery of multimedia content to any Internet Protocol (IP)-enabled device capable of hosting a web browser, this technology could potentially be used and deployed over millions of smartphones, tablets and personal computers worldwide. This service and device convergence remains an important goal of telecommunication network operators who seek to enable it through a converged network that is based on the IP Multimedia Subsystem (IMS). IMS is an IP-based subsystem that sits at the core of a modern telecommunication network and acts as the main routing substrate for media services and applications such as those that WebRTC realises. The combination of WebRTC and IMS represents an attractive coupling, and as such, a protracted investigation could help to answer important questions around the technical challenges that are involved in their integration, and the merits of various design alternatives that present themselves. This thesis is the result of such an investigation and culminates in the presentation of a detailed architectural model that is validated with a prototypical implementation in an open source testbed. The model is built on six requirements which emerge from an analysis of the literature, including previous interventions in IMS networks and a key technical report on design alternatives. Furthermore, this thesis argues that the client architecture requires support for web-oriented signalling, identity and call handling techniques leading to a potential for IMS networks to natively support these techniques as operator networks continue to grow and develop. The proposed model advocates the use of SIP over WebSockets for signalling and DTLS-SRTP for media to enable one-to-one communication and can be extended through additional functions resulting in a modular architecture. The model was implemented using open source tools which were assembled to create an experimental network testbed, and tests were conducted demonstrating successful cross domain communications under various conditions. The thesis has a strong focus on enabling ordinary software developers to assemble a prototypical network such as the one that was assembled and aims to enable experimentation in application use cases for integrated environments.
- Full Text:
- Date Issued: 2018
SecMVC : a model for secure software design based on the model-view-controller pattern
- Authors: Colesky, Michael Robert
- Date: 2014
- Subjects: Computer networks -- Security measures -- Software , Computer software -- Development , Model-driven software architecture
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9823 , http://hdl.handle.net/10948/d1020614
- Description: Current advances in the software development industry are growing more ubiquitous by the day. This has caused for security, not only in the broader sense, but specifically within the design and overall development of software itself, to become all the more important. An evidently prevalent problem in the domain of software development is that software security is not consistently addressed during design, which undermines core security concerns, and leads to the development of insecure software. This research seeks to address this issue via a model for secure software design, which is based on a software design pattern, namely, the Model-View-Controller (MVC) pattern. The use of a pattern to convey knowledge is not a new notion. However, the ability of software design patterns to convey secure software design is an idea worth investigating. Following identification of secure software design principles and concepts, as well as software design patterns, specifically those relating to the MVC pattern, a model was designed and developed. With the MVC pattern argued as being a suitable foundation for the model, the security conscious MVC (SecMVC) combines secure software design principles and concepts into the MVC pattern. Together herewith, the MVC pattern’s components in the MVC Compound pattern, namely: the Observer pattern, the Strategy pattern, and the Composite pattern, have provided further sub-models for less abstraction and greater detail. These sub-models were developed, as a result of the SecMVC model’s evaluation in the validation for this study, an expert review. Argued in the light of similar research methods, the expert review was chosen – along with a process that included the use of two expert participants to validate the SecMVC model. It was determined through the expert review that the SecMVC model is of sufficient utility, quality, and efficacy to constitute research value. The research methodology process followed was design science, in which the SecMVC model, which includes its related sub-models, serves as the artefact and research output of this study. This research study contributes evidence of the feasibility for integrating knowledge into software design patterns. This includes the SecMVC model itself. In addition, it argues for the use of an expert review, as an evaluative research method for such an artifact.
- Full Text:
- Date Issued: 2014
- Authors: Colesky, Michael Robert
- Date: 2014
- Subjects: Computer networks -- Security measures -- Software , Computer software -- Development , Model-driven software architecture
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9823 , http://hdl.handle.net/10948/d1020614
- Description: Current advances in the software development industry are growing more ubiquitous by the day. This has caused for security, not only in the broader sense, but specifically within the design and overall development of software itself, to become all the more important. An evidently prevalent problem in the domain of software development is that software security is not consistently addressed during design, which undermines core security concerns, and leads to the development of insecure software. This research seeks to address this issue via a model for secure software design, which is based on a software design pattern, namely, the Model-View-Controller (MVC) pattern. The use of a pattern to convey knowledge is not a new notion. However, the ability of software design patterns to convey secure software design is an idea worth investigating. Following identification of secure software design principles and concepts, as well as software design patterns, specifically those relating to the MVC pattern, a model was designed and developed. With the MVC pattern argued as being a suitable foundation for the model, the security conscious MVC (SecMVC) combines secure software design principles and concepts into the MVC pattern. Together herewith, the MVC pattern’s components in the MVC Compound pattern, namely: the Observer pattern, the Strategy pattern, and the Composite pattern, have provided further sub-models for less abstraction and greater detail. These sub-models were developed, as a result of the SecMVC model’s evaluation in the validation for this study, an expert review. Argued in the light of similar research methods, the expert review was chosen – along with a process that included the use of two expert participants to validate the SecMVC model. It was determined through the expert review that the SecMVC model is of sufficient utility, quality, and efficacy to constitute research value. The research methodology process followed was design science, in which the SecMVC model, which includes its related sub-models, serves as the artefact and research output of this study. This research study contributes evidence of the feasibility for integrating knowledge into software design patterns. This includes the SecMVC model itself. In addition, it argues for the use of an expert review, as an evaluative research method for such an artifact.
- Full Text:
- Date Issued: 2014
Wireless mobile android technology in the monitoring and control of a safety integrated robotic cell
- Authors: Cumberlege, Aidan
- Date: 2013
- Subjects: Android (Electronic resource) , Application software -- Development , Computer software -- Development , Mobile computing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/46284 , vital:39543
- Description: The constant strive for improving the efficiency of production processes has become a worldwide challenge. In high speed production facilities response time between man and machine is of utmost importance when financial implications are taken into account. This dissertation contributes to improving the response time by making use of wireless notification between the machine and the maintenance technician when process faults occur. The tool used to achieve this is based on Android. Research is carried out on the latest Android technology while taking the safety aspects of a production environment into consideration. Research in designing a rule based intelligent system is established by using a tablet as the user interface for automatic notification and corrective action recommendations. Quick response is achieved by setting up a wireless network. As a result of designing a wireless intelligent maintenance tool, production downtime is improved. Management can recall all activities logged by the system for graphical representation.
- Full Text:
- Date Issued: 2013
Wireless mobile android technology in the monitoring and control of a safety integrated robotic cell
- Authors: Cumberlege, Aidan
- Date: 2013
- Subjects: Android (Electronic resource) , Application software -- Development , Computer software -- Development , Mobile computing
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: http://hdl.handle.net/10948/46284 , vital:39543
- Description: The constant strive for improving the efficiency of production processes has become a worldwide challenge. In high speed production facilities response time between man and machine is of utmost importance when financial implications are taken into account. This dissertation contributes to improving the response time by making use of wireless notification between the machine and the maintenance technician when process faults occur. The tool used to achieve this is based on Android. Research is carried out on the latest Android technology while taking the safety aspects of a production environment into consideration. Research in designing a rule based intelligent system is established by using a tablet as the user interface for automatic notification and corrective action recommendations. Quick response is achieved by setting up a wireless network. As a result of designing a wireless intelligent maintenance tool, production downtime is improved. Management can recall all activities logged by the system for graphical representation.
- Full Text:
- Date Issued: 2013
Email meets issue-tracking: a prototype implementation
- Authors: Kwinana, Zukhanye N
- Date: 2006 , 2013-06-11
- Subjects: Microsoft Visual studio , Electronic mail systems , Computer networks , eXtreme programming , Computer software -- Development
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4614 , http://hdl.handle.net/10962/d1005644 , Microsoft Visual studio , Electronic mail systems , Computer networks , eXtreme programming , Computer software -- Development
- Description: The use of electronic mail (email) has evolved from sending simple messages to task delegation and management. Most mail clients, however, have not kept up with the evolution and as a result have limited task management features available. On the other hand, while issue tracking systems offer useful task management functionality, they are not as widespread as emails and also have a few drawbacks. This thesis reports on the exploration of the integration of the ubiquitous nature of email with the task management features of issue-tracking systems. We explore this using simple ad-hoc as well as semi-automated tasks. With these two working together, tasks can be delegated from email clients without needing to switch between the two environments. It brings some of the benefits of issue tracking systems closer to our email users.The system is developed using Microsoft VisuaI Studio.NET. with the code written in C#. The eXtreme Programming (XP) methodology was used during the development of the proof-of-concept prototype that demonstrates the integration of the two environments, as we were faced at first with vague requirements bound to change, as we better understood the problem domain through our development. XP allowed us to skip an extended and comprehensive initial design process and incrementally develop the system, making refinements and extensions as we encountered the need for them. This alleviated the need to make upfront decisions that were based on minimal knowledge of what to expect during development. This thesis describes the implementation of the prototype and the decisions made with each step taken towards developing an email-based issue tracking system. With the two environments working together, we can now easily track issues from our email clients without needing to switch to another system. , KMBT_363 , Adobe Acrobat 9.54 Paper Capture Plug-in
- Full Text:
- Date Issued: 2006
- Authors: Kwinana, Zukhanye N
- Date: 2006 , 2013-06-11
- Subjects: Microsoft Visual studio , Electronic mail systems , Computer networks , eXtreme programming , Computer software -- Development
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4614 , http://hdl.handle.net/10962/d1005644 , Microsoft Visual studio , Electronic mail systems , Computer networks , eXtreme programming , Computer software -- Development
- Description: The use of electronic mail (email) has evolved from sending simple messages to task delegation and management. Most mail clients, however, have not kept up with the evolution and as a result have limited task management features available. On the other hand, while issue tracking systems offer useful task management functionality, they are not as widespread as emails and also have a few drawbacks. This thesis reports on the exploration of the integration of the ubiquitous nature of email with the task management features of issue-tracking systems. We explore this using simple ad-hoc as well as semi-automated tasks. With these two working together, tasks can be delegated from email clients without needing to switch between the two environments. It brings some of the benefits of issue tracking systems closer to our email users.The system is developed using Microsoft VisuaI Studio.NET. with the code written in C#. The eXtreme Programming (XP) methodology was used during the development of the proof-of-concept prototype that demonstrates the integration of the two environments, as we were faced at first with vague requirements bound to change, as we better understood the problem domain through our development. XP allowed us to skip an extended and comprehensive initial design process and incrementally develop the system, making refinements and extensions as we encountered the need for them. This alleviated the need to make upfront decisions that were based on minimal knowledge of what to expect during development. This thesis describes the implementation of the prototype and the decisions made with each step taken towards developing an email-based issue tracking system. With the two environments working together, we can now easily track issues from our email clients without needing to switch to another system. , KMBT_363 , Adobe Acrobat 9.54 Paper Capture Plug-in
- Full Text:
- Date Issued: 2006
The implementation of a core architecture for geophysical data acquisition
- Authors: Heasman, Ray Edward
- Date: 2000
- Subjects: Geophysics -- Data processing , Computer software -- Development , Seismometers , Computer input-output equipment
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5471 , http://hdl.handle.net/10962/d1005256 , Geophysics -- Data processing , Computer software -- Development , Seismometers , Computer input-output equipment
- Description: This thesis describes the design, development and implementation of the core hardware and software of a modular data acquisition system for geophysical data collection. The primary application for this system is the acquisition and realtime processing of seismic data captured in mines. This system will be used by a commercial supplier of seismic instrumentation, ISS International, as a base architecture for the development of future products. The hardware and software has been designed to be extendable and support distributed processing. The IEEE-1394 High Performance Serial Bus is used to communicate with other CPU modules or peripherals. The software includes a pre-emptive multitasking microkernel, an asynchronous mailbox-based message passing communications system, and a functional IEEE-1394 protocol stack. The reasons for the end design and implementation decisions are given, and the problems encountered in the development of this system are described. A critical assessment of the match between the requirements for the project and the functionality of the implementation is made.
- Full Text:
- Date Issued: 2000
- Authors: Heasman, Ray Edward
- Date: 2000
- Subjects: Geophysics -- Data processing , Computer software -- Development , Seismometers , Computer input-output equipment
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:5471 , http://hdl.handle.net/10962/d1005256 , Geophysics -- Data processing , Computer software -- Development , Seismometers , Computer input-output equipment
- Description: This thesis describes the design, development and implementation of the core hardware and software of a modular data acquisition system for geophysical data collection. The primary application for this system is the acquisition and realtime processing of seismic data captured in mines. This system will be used by a commercial supplier of seismic instrumentation, ISS International, as a base architecture for the development of future products. The hardware and software has been designed to be extendable and support distributed processing. The IEEE-1394 High Performance Serial Bus is used to communicate with other CPU modules or peripherals. The software includes a pre-emptive multitasking microkernel, an asynchronous mailbox-based message passing communications system, and a functional IEEE-1394 protocol stack. The reasons for the end design and implementation decisions are given, and the problems encountered in the development of this system are described. A critical assessment of the match between the requirements for the project and the functionality of the implementation is made.
- Full Text:
- Date Issued: 2000
An automatic programming system to generate payroll programs
- Fielding, Elizabeth Vera Catherine
- Authors: Fielding, Elizabeth Vera Catherine
- Date: 1979
- Subjects: Computer software -- Development , Programming (computers) , Software architecture
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4695 , http://hdl.handle.net/10962/d1011829 , Computer software -- Development , Programming (computers) , Software architecture
- Description: The purpose of this project was to try to investigate one approach to the problem of automatically generating programs from some specification. Rather than following the approach which requires the user to define his problem using some formulation, it was decided to look at a class of problems that have similar solutions, but have many variations, and to try to design a system capable of obtaining user requirements and generating solutions tailored to these requirements. The aim was to design the system in such a way that it could be extended to cater for other classes of problems, so that eventually a system which could automatically generate program solutions for a range of problems might be developed. Intro. p. 1.
- Full Text:
- Date Issued: 1979
- Authors: Fielding, Elizabeth Vera Catherine
- Date: 1979
- Subjects: Computer software -- Development , Programming (computers) , Software architecture
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4695 , http://hdl.handle.net/10962/d1011829 , Computer software -- Development , Programming (computers) , Software architecture
- Description: The purpose of this project was to try to investigate one approach to the problem of automatically generating programs from some specification. Rather than following the approach which requires the user to define his problem using some formulation, it was decided to look at a class of problems that have similar solutions, but have many variations, and to try to design a system capable of obtaining user requirements and generating solutions tailored to these requirements. The aim was to design the system in such a way that it could be extended to cater for other classes of problems, so that eventually a system which could automatically generate program solutions for a range of problems might be developed. Intro. p. 1.
- Full Text:
- Date Issued: 1979
- «
- ‹
- 1
- ›
- »