The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Analyses of Evolving Legacy Software into Secure Service-Oriented Software using Scrum and a Visual Model
|
Author(s): Sam Chung (Institute of Technology, University of Washington, USA), Conrado Crompton (Institute of Technology, University of Washington, USA), Yan Bai (Institute of Technology, University of Washington, USA), Barbara Endicott-Popovsky (University of Washington, USA), Seung-Ho Baeg (Korea Institute of Industrial Technology, Korea)and Sangdeok Park (Korea Institute of Industrial Technology, Korea)
Copyright: 2013
Pages: 22
Source title:
Agile and Lean Service-Oriented Development: Foundations, Theory, and Practice
Source Author(s)/Editor(s): Xiaofeng Wang (Free University of Bozen/Bolzano, Italy), Nour Ali (Lero- The Irish Software Engineering Research Centre, University of Limerick, Ireland), Isidro Ramos (Valencia University of Technology, Spain)and Richard Vidgen (Hull University Business School, UK)
DOI: 10.4018/978-1-4666-2503-7.ch010
Purchase
|
Abstract
This chapter explores using service-oriented computing to reengineer non-secure legacy software applications to create new secure target applications. Two objectives of this chapter are: (1) to analyze the architectural changes required in order to adopt new web technologies and cope with resultant vulnerabilities in source code; and (2) to measure the level of effort required to modernize software by adopting new web technologies and adding security countermeasures. To meet these objectives, a model-driven Scrum for Service-Oriented Software Reengineering (mScrum4SOSR) methodology was chosen and applied to a reengineering project. Scrum is employed to manage the reengineering project, as well as to measure implementation effort related to the modernization process. Further, a re-documentation technique called 5W1H Re-Doc is used to re-document the non-secure software application at a high level of abstraction in order to help project participants comprehend what is needed to identify candidate services for service-oriented reengineering. Case studies with and without security features are created for different types of applications - a desktop graphical user interface, a web application, a web services application, a restful web services application, and an enterprise service bus application.
Related Content
Preethi, Sapna R., Mohammed Mujeer Ulla.
© 2023.
16 pages.
|
Srividya P..
© 2023.
12 pages.
|
Preeti Sahu.
© 2023.
15 pages.
|
Vandana Niranjan.
© 2023.
23 pages.
|
S. Darwin, E. Fantin Irudaya Raj, M. Appadurai, M. Chithambara Thanu.
© 2023.
33 pages.
|
Shankara Murthy H. M., Niranjana Rai, Ramakrishna N. Hegde.
© 2023.
23 pages.
|
Jothimani K., Bhagya Jyothi K. L..
© 2023.
19 pages.
|
|
|