SlideShare a Scribd company logo
2
Most read
Extending the McCumber
Cube To Model Software
System Maintenance
Tasks
Vorachet Jaroensawas1, Vajirasak Vanijja2 and Chonlameth Arpnikanondt1
1Requirements Engineering Lab, School of Information Technology
2IP Communications Lab, School of Information Technology
King Mongkut’s University of Technology, Bangkok, Thailand Emails: vorachet@gmail.com, {vachee, chonlameth}@sit.kmutt.ac.th
Introduction
Welcome
My subject is “Extending The McCumber
Cube To Model Software System
Maintenance Tasks (SSMT)”
Online the structure of THIS presentation
Instruction about questions “Do feel free
to interrupt me if you have any questions”
1. the progress of this year
2. the problem we have encountered and how alleviate them
2.1 the need of maintenance policies study
2.2 the lack of understanding problem
2.3 What maintenance is best for us?
3. The proposed extension
4. Validation of the research (application case study)
5. Conclusion
the problem we have encountered
The need of maintenance policies study
the lack of understanding problem
What maintenance is best for us?
how alleviate them
A clear guideline for understanding the
general decision structure for SSMT is needed
Model based approach are needed
Security-driven approach is needed
McCumber Cube Price’s extension
McCumber Cube Price’s extension
Maintenance Policies :
FBM,CBM,DOM,TBM/UBM,OBM
Maintenance Policies :
FBM,CBM,DOM,TBM/UBM,OBM
Extends
Extends
Our extension
Price’s extensionMcCumber Cube
The proposed Extension
Method Process
Overview
Design data MSI of Interest
This section specifies the functional requirements of mycompany.com in terms of list of requirements and the
selected maintenance significant items on which we are interested to model. The selected issues of assumed
maintenance decision support data are consist of the following: integrity of visitor database, integrity of web
documents, and availability of HTTP service. We assume that these three issues are identified as a high-impacted
incident.
APPLICATION CASE STUDY
The selected maintenance policy is CBM. This
predictive maintenance is widely-used for a
system maintainer where parameters of the
computer resources such as the CPU, memory,
and network bandwidth can be measured by a
monitoring software application.
In this example, the countermeasure
proposes the DOM maintenance policy
which will be implemented with database
replication software. The focus of DOM is
to improve the design in order to make
maintenance easier or to even eliminate
it.
This case study assumes that the system
does not provide rigid control of release
process for the homepage maintenance. FBM
is typically handy in case of random
failure behavior or no preventive
maintenance task found on the MSI.
APPLICATION CASE STUDY
Integrity of visitor database
Integrity of web documents
Availability of HTTP service
The selected issues of assumed maintenance decision support data are consist of the following: integrity of visitor database, integrity of web documents, and
availability of HTTP service. We assume that these three issues are identified as a high-impacted incident.
Conclusion
Advantages Disadvantages
It seems that a number of organizations
today prefer reducing risks of critical
system maintenance by outsourcing to a
specialized service provider—as oppose
to building their own maintenance team.
In that case, the proposed method could
be of more use to the contracted third
party.
• A clear guideline for understanding the general
decision structure for SSMT
• Model based approach
• Security-driven approach
Recommendations
COntributions
This paper introduced a novel method
for representing maintenance task
modeling. The method was based on
Price’s work and explicitly associated
the general security goal to prescribe
the required maintenance policies and
actions. It effectively allowed the
maintainer to model maintenance
tasks from the security point of view,
as well as to reason how the
maintainer should maintain the critical
items belonging to risk assessment.
The method process overview
shows how the maintenance
concept is composed. The idea of
an optimized maintenance
program suggests that an
adequate mix of maintenance
actions and policies need to be
selected and fine-tuned in order to
satisfy maintenance objectives.
Rausand and Vatn explained the
concept of the reliability-centered
maintenance (RCM) analysis
process and argued that design
data, operational and failure data,
as well as reliability data are
n e e d e d f o r a n e f f e c t i v e
maintenance analysis.

More Related Content

PPTX
Decision support system : Concept and application
PDF
PDF
Machine learning meets user analytics - Metageni tech talk
PPTX
Performance improvement through mobile devices
PDF
Ap03402460251
PDF
Design and implementation for
PPTX
Social Network Analysis: A Discussion Forum on Weight Loss
PPT
An architecture-centric approach for systems design
Decision support system : Concept and application
Machine learning meets user analytics - Metageni tech talk
Performance improvement through mobile devices
Ap03402460251
Design and implementation for
Social Network Analysis: A Discussion Forum on Weight Loss
An architecture-centric approach for systems design

Similar to Extending the McCumber Cube to Model Software System Maintenance Tasks (20)

PDF
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
PDF
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
DOCX
RELIABILITY CENTERED MAINTAINANCE
DOCX
RELIABILITY CENTERED MAINTAINANCE
PDF
Recommender-technology-ReColl08
PDF
Survey on Software Data Reduction Techniques Accomplishing Bug Triage
PDF
Simplifying Model-Based Systems Engineering - an Implementation Journey White...
PDF
Challenges of Cloud Monitoring
DOCX
Is 4 th
PDF
Role of Operational System Design in Data Warehouse Implementation: Identifyi...
PDF
H017634452
PDF
IRJET- Social Network Message Credibility: An Agent-based Approach
PDF
IRJET - Social Network Message Credibility: An Agent-based Approach
PDF
The_Essential_EDC_Partnership_Strategy_for_Ensuring_Study_Success
PPT
MIS Wk-10.ppt
PPTX
Detailed presentation about the dream software i build.pptx
PDF
PPTX
Electrical distribution system planning
PDF
Markov Chain for the Recommendation of Materialized Views in Real-Time Data W...
PDF
MARKOV CHAIN FOR THE RECOMMENDATION OF MATERIALIZED VIEWS IN REAL-TIME DATA W...
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...
Best Practices for Microsoft-Based Plant Software Address Reliability, Cost, ...
RELIABILITY CENTERED MAINTAINANCE
RELIABILITY CENTERED MAINTAINANCE
Recommender-technology-ReColl08
Survey on Software Data Reduction Techniques Accomplishing Bug Triage
Simplifying Model-Based Systems Engineering - an Implementation Journey White...
Challenges of Cloud Monitoring
Is 4 th
Role of Operational System Design in Data Warehouse Implementation: Identifyi...
H017634452
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
The_Essential_EDC_Partnership_Strategy_for_Ensuring_Study_Success
MIS Wk-10.ppt
Detailed presentation about the dream software i build.pptx
Electrical distribution system planning
Markov Chain for the Recommendation of Materialized Views in Real-Time Data W...
MARKOV CHAIN FOR THE RECOMMENDATION OF MATERIALIZED VIEWS IN REAL-TIME DATA W...
Ad

More from Vorachet Jaroensawas (8)

PDF
Digital Twin Consortium ได้เผยแพร่คู่มือให้ภาพรวมเกี่ยวกับประโยชน์ที่เป็นไปได...
PDF
เรือผิวน้ำไร้คนขับ Unmanned Surface Vessel
PDF
Situational Awareness
PDF
Generic Roles and Tasks Common to Most Associations.pdf
PDF
GSL Examples
PDF
OSLC4j FMI 1.1.0
PDF
OSLC Adapter for Publishing Information on FMUs (Functional Mockup Units)
Digital Twin Consortium ได้เผยแพร่คู่มือให้ภาพรวมเกี่ยวกับประโยชน์ที่เป็นไปได...
เรือผิวน้ำไร้คนขับ Unmanned Surface Vessel
Situational Awareness
Generic Roles and Tasks Common to Most Associations.pdf
GSL Examples
OSLC4j FMI 1.1.0
OSLC Adapter for Publishing Information on FMUs (Functional Mockup Units)
Ad

Recently uploaded (20)

PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Presentation on HIE in infants and its manifestations
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Institutional Correction lecture only . . .
PDF
Computing-Curriculum for Schools in Ghana
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Classroom Observation Tools for Teachers
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Pharma ospi slides which help in ospi learning
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Microbial disease of the cardiovascular and lymphatic systems
2.FourierTransform-ShortQuestionswithAnswers.pdf
Presentation on HIE in infants and its manifestations
Anesthesia in Laparoscopic Surgery in India
Institutional Correction lecture only . . .
Computing-Curriculum for Schools in Ghana
O7-L3 Supply Chain Operations - ICLT Program
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Complications of Minimal Access Surgery at WLH
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
human mycosis Human fungal infections are called human mycosis..pptx
Classroom Observation Tools for Teachers
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Pharma ospi slides which help in ospi learning
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS

Extending the McCumber Cube to Model Software System Maintenance Tasks

  • 1. Extending the McCumber Cube To Model Software System Maintenance Tasks Vorachet Jaroensawas1, Vajirasak Vanijja2 and Chonlameth Arpnikanondt1 1Requirements Engineering Lab, School of Information Technology 2IP Communications Lab, School of Information Technology King Mongkut’s University of Technology, Bangkok, Thailand Emails: vorachet@gmail.com, {vachee, chonlameth}@sit.kmutt.ac.th
  • 2. Introduction Welcome My subject is “Extending The McCumber Cube To Model Software System Maintenance Tasks (SSMT)” Online the structure of THIS presentation Instruction about questions “Do feel free to interrupt me if you have any questions” 1. the progress of this year 2. the problem we have encountered and how alleviate them 2.1 the need of maintenance policies study 2.2 the lack of understanding problem 2.3 What maintenance is best for us? 3. The proposed extension 4. Validation of the research (application case study) 5. Conclusion
  • 3. the problem we have encountered The need of maintenance policies study the lack of understanding problem What maintenance is best for us?
  • 4. how alleviate them A clear guideline for understanding the general decision structure for SSMT is needed Model based approach are needed Security-driven approach is needed McCumber Cube Price’s extension McCumber Cube Price’s extension Maintenance Policies : FBM,CBM,DOM,TBM/UBM,OBM
  • 9. Design data MSI of Interest This section specifies the functional requirements of mycompany.com in terms of list of requirements and the selected maintenance significant items on which we are interested to model. The selected issues of assumed maintenance decision support data are consist of the following: integrity of visitor database, integrity of web documents, and availability of HTTP service. We assume that these three issues are identified as a high-impacted incident. APPLICATION CASE STUDY
  • 10. The selected maintenance policy is CBM. This predictive maintenance is widely-used for a system maintainer where parameters of the computer resources such as the CPU, memory, and network bandwidth can be measured by a monitoring software application. In this example, the countermeasure proposes the DOM maintenance policy which will be implemented with database replication software. The focus of DOM is to improve the design in order to make maintenance easier or to even eliminate it. This case study assumes that the system does not provide rigid control of release process for the homepage maintenance. FBM is typically handy in case of random failure behavior or no preventive maintenance task found on the MSI. APPLICATION CASE STUDY Integrity of visitor database Integrity of web documents Availability of HTTP service The selected issues of assumed maintenance decision support data are consist of the following: integrity of visitor database, integrity of web documents, and availability of HTTP service. We assume that these three issues are identified as a high-impacted incident.
  • 11. Conclusion Advantages Disadvantages It seems that a number of organizations today prefer reducing risks of critical system maintenance by outsourcing to a specialized service provider—as oppose to building their own maintenance team. In that case, the proposed method could be of more use to the contracted third party. • A clear guideline for understanding the general decision structure for SSMT • Model based approach • Security-driven approach Recommendations COntributions This paper introduced a novel method for representing maintenance task modeling. The method was based on Price’s work and explicitly associated the general security goal to prescribe the required maintenance policies and actions. It effectively allowed the maintainer to model maintenance tasks from the security point of view, as well as to reason how the maintainer should maintain the critical items belonging to risk assessment. The method process overview shows how the maintenance concept is composed. The idea of an optimized maintenance program suggests that an adequate mix of maintenance actions and policies need to be selected and fine-tuned in order to satisfy maintenance objectives. Rausand and Vatn explained the concept of the reliability-centered maintenance (RCM) analysis process and argued that design data, operational and failure data, as well as reliability data are n e e d e d f o r a n e f f e c t i v e maintenance analysis.