Table of Contents
1.Introduction1
1.1.Overview1
1.2.Scope3
2.How to use a Software Reference Architecture?4
2.1.Key Authoritative Sources4
3.Context5
3.1.Guiding Principles5
3.2.Constraints and Assumptions6
3.2.1.Constraints6
3.2.2.Assumptions7
3.3.Alignment Priority Areas7
4.Data8
4.1.Framework8
4.2.Storage10
4.3.Data Integrity10
4.4.Data Archiving11
5.Software12
5.1.Presentation Layer13
5.2.Business Logic Layer14
5.3.Data Access Layer15
6.Technical Positions16
Introduction
Software reference architectures documents and illustrates guidance when designing and developing systems for specific applications, IT environment and infrastructure and/or technology domains.
A software reference architecture can be defined as a generic architecture that relates to a class of information systems and is used as a key foundational element for the design of concrete architectures using the particular class.
We understand that certain software reference architectures tend to deliver more productive results than others. One of the biggest reasons behind this is the level of congruence demonstrated between their context, design, and goals.
In this software reference architecture document, we propose and demonstrate a novel software architecture, related topologies, tools, and associated framework for the ‘Information Management & Security’ (IMS) division at the National Aeronautics and Space Administration (NASA).
Using our proposed framework for data storage, maintenance and transmission, the organization can achieve a stable, secure, high-end and seamless alignment of its congruent design, context and goals. This document will facilitate design of a robust and more efficient reference architecture of the proposed application for IMS at NASA.
Software reference architecture has evolved as an abstractions of concrete architectures from a specific domain. Reference architectures (RA) are being used around the world for inspiration while designing concrete architectures or as an effective tool and standardize interoperability between systems and various components of systems.
A reference architecture is used for designing concrete architectures in multiple contexts, influencing different stakeholders in every context. In view of the increasing complexity and competitiveness of software applications being implemented these days, the need for effective and efficient software design processes and for optimal levels of system interoperability inspires a major role of a reference architecture in the software design and development process.
A software reference model can defined as a division of functionality along with data flow between the pieces and elements, and a reference architecture is generally a reference model that is mapped onto the software elements required for cooperatively implementing the functionality defined in the software reference model and the architecture information flows between them.
An effective concrete software architecture is designed in line with the necessary functionalities and system, architecture qualities, and business paradigms as defined by the stakeholders.
These qualities and functionalities underline certain context and the business objectives of the stakeholders. The document discuss the types of potential goals, the method to identify required qualities and functionalities, and their influence on the design of the architecture.
The usage in system design of a well-planned concrete software architecture is in a sense certain as the architecture is designed precisely for the development of the proposed system. A Reference Architecture is considered an organizational asset.
Providing common language for the various stakeholdersProviding consistency of implementation of technology to solve problems Encouraging adherence to common standards, specifications, and patterns
XXXXXX and XXXXXXXXXXX XXX development of
XXXXX
The XXXXXXXX Reference XXXXXXXXXXXX XXXXXXXX XXXXXXXX effective XXXXXXX and guidelines XX make XXXXXXXXX XXXXXXXXXXXXX XXXXXXXXX when XXXXXXXXXXXX a XXXXXXXX software architecture XXXXX in high-XXXXXXXXXXX, XXXXX government XXXXXXXX XXXX XX NASA.
The documented XXXXXXXX XXXXXXXXX architecture has a XXXXX XXXXX XXXXX XXXXXXXX, but XX XXX XXXXXXX XX, helping the XXXXXXXXX XXXXXXXXXXX XXXXXXXXXX XXX relation XXXXXXX different XXXXXXXX development artifacts, XXXXXXXXXX XXXXXXXX high-level challenges XXXXXXXXXX to XXX design, XXXXXXXXXX XXX usage XX the software XXXXXXXXXXXX model, etc. XXXXX XXXXXXXXXX XXX be XXXXXXXXXXX used to:
Define software XXXXXXXXXXX and XXXXXXX XXXXX XXXXXXXXX XXXXXXXXXXX scenarios XXXXXXX XXX XXXXXXXXXXX of a reference architecture can XX XXXXXXX,XXXXXXXXX XXXXXXX XXXXXXXX problems and concerns XXX XXX further work, andXXXXXXX different XXXXXXXX application XXXXXX XXXX can XXXXXXX XXXX the XXXXXXXX XXXXXXXXX and software XXXXXXXXXXXX, XXXX as XXXXXXX concrete challenges XXXXXXXX XX XXXXXXXXX XXXXXXXXXXXX XXX XXXXXXXXXX of a XXXXXX software XXXXX in the XXXXXXXXX department.
The XXXXXXXXXXX XXXXX XX this document include, XXX are not limited XX, XXX XXXXXXXXX:
Introducing XXXXXXXXX XXXXXXXXXXXXX XXX distinctions in context of the topicXXXXXXXX key XXXXXX XXX designing XXX assessing XXXXXXXX XXXXXXXXXXXXX in XXX XXXXXXXXXXXXIdentifying and discussing XXXXXXX XXXXXXXX XXXXXX XXX XXX XXXXXXXXXX XXXX as XXXXXXXXXX, XXXXXXXX, and architectural XXXXXX, to integrate different XXXXXXXX XX a SRA solutionXXXXXXXXXXXXX XXXXXXXXXXXXX for XXXXXXXX and/or platform sharing XXXXXXX XXXXXXXXX departments at NASA.XXXXXXXXXX XXXXXXXXXXXX that XXXX XXXXXXXX in XXX case XXXXX.Non-functional requirements, captured in supplementary XXXXXXXXXXXXXX.The system’s capabilities XXX XXXXXXXXXXThe XXXXXXXXXX environment XXX XXXXXXXXX XXXXXX.
How XX XXX a Software XXXXXXXXX XXXXXXXXXXXX?
XXXXX in the XXXXXXXXXXX XX the software XXXXXXX's Vision, it is XXXXXXXXX to XXXXXXXX XXX impact of XXX business case on various other XXXXXXXXX XXXX XXX XXXXXXX in production XXXXX with XXX XXXXXXXXXX XXX existing software XXXXXXXXX XXXXXXXXXXXX can deliver to the XXXXXXX.
XXXX is the most desired XXXXXXX of XXX Architectural XXXXXXXX, which XXXXXXXX XXXXXXXXX XXX XXXXXXXX XXXXXXXXX architecture to XXX XXXX. The XXXXXXXXXXXX may XXXXX XXXX it needs to XXXXXXXX its reference architecture in XXXXXXXXXX XXXX XXXX XXXXXXX XXXXXXXXXX. XXX XXXXXXXX, requirements may XXXXXXXXX a novel middleware service not XXXXXXXXXXX XXXXXXXX in the XXXXXXXXX XXXXXXXXXXXX XXXXXXXX within XXX IT XXXXXXXXXXX.
XXXXXXXX, XXXXX XXXXXXXXX XXXXXXXX may cascade and impact XXXXXXX established architectural XXXXXXXXX. XXXXX, XXX XXXXXXXXXXXX XXXXX XXXX to XXXXXX and XXXXXXX XXXXXXXX XXX XXXXXXXX XXXXXXX security XXXXXXXX and XXXX XXXXXXX XX well as XXXXXX measures in accordance with XXX XXXXXXXXX XXXXXXXXXXXX.
XXXXX frequently, the XXXXX XXXXXXXXXXX that rams XXXX an architectural XXXXXX not XXXXXXXXX in the XXXXXXX reference XXXXXXXXXXXX XXXX, by XXXXXXX, XXXXXX and XXXXXXXXX new XXXXXXXXXXXXX standards for all XXXXXX XXXXXX XXX XXXXXXXXXXX projects. XXXXXXX, it XX XXXXX extremely significant that the software reference XXXXXXXXXXXX XX able to XXXXXX the accumulation XXXXXXX rescinding all previously existing XXXXXXXXX. It XX vital XX XXXXX for a ripple effect XXX cautiously monitor XXX XXXX of decision-XXXXXX to alter standards.
XXX Authoritative Sources
XXXXX XXXXXXXXXXX XXXX software reference XXXXXXXXXXXX document for the Information Management and XXXXXXXX (XXX) XXXX XX XXXX, several authoritative XXXXXXX XXXX carefully XXXXXXXX XX ensure XXX information XXXXXXXXX XX properly cited, professionally-XXXXXXXXXXX, standards-XXXXX, accurate XXX credible, and XXXXXX to work effectively XXXXX XXX XXXXXXXXX XXXXXXXXXXXXX XXXXX. Several handpicked archival, corroborate ad XXXXXXXXXX sources XXXX XXXXXXXX to XXXX verified XXXXXXX, proven topologies and industry best XXXXXXXXX.
A complete list XX all sources XXX XXXXXXXXXX XXX been XXXXXXXX XXXXX XXX references XXXXXXX XX the end of the document. XXXX of the XXXXXXXXXX sources include IBM XXXXXXXXXXXXXX Library, XXXXXXXX Reference Architectures: XXXXXXX XXXXXXXXXXXXX Concepts and Challenges (Matthias XXXXXXX, XXXX), XXXXXXXXX XXXXXXXXXXX Architecture XXXXX, XXX Edition – XXXX, Oracle XXXXXXXXX Architecture XXXXXXXX, and XXXX more.
XXXXXXX
In an XXXXXXXXX, XXXXXX-XXXXXXXXX work XXXXXXXXXXX such XX XXXX, XXXX XXXXXXX and the way XXXXXXXXX members of different teams access, XXXXXX, XXXXXXXXXXXX XXX XXXXXXXX XXXX, XXXXXXXXXXXX over a network, is XXX XXXX important XXX it XXX be very critical XXX, more when it XXXXX to the part of handling exceptions, XXXXXXXXXXXXXXX, data XXX XXXXXXXXXXX, XXXXXXXX, etc.
When XXXXXXX of XXXX have to XX stores in a single XXXX XXXXXX, providing XXXXXX to XXXXXXXXX XXXXXX XX XXXXXXXXX XXXXX, there can be XXXXXXXX challenges, not just in terms XX XXX XXXX XXXXX XXXXXXXX, XXX XXXX XXX authentication before accessing the data XXXXXX itself, and XXXX prior to XXXXXXX the XXXXXXXXXXX XXXX anyone over a XXXXXXX.
XXX XXXXXXXX XXXXXX that XXXX had in XXXXXX XXX XXXXXXX XXXXX which used XX XXXX XX XXXXXXXXX, XXXXXXXX XXXX access, XXXXXX XX XXXXXXXXXXXXX XXX XXXXXXXXXXXX professionals who didn’t actually XXXXXX to XXX XXXX technical XXXX XXXXXXXXXX and XXXXXXXXXXX team, data XXXX due to unwanted overwrite, file damage, privacy issues XXXXX XXXXXXX XXXX XXXX an XXXXXXXXXXX network XXXXXXXX or the cloud services XXXXX used XX XXX XXXXXXXXXX for XXX day to XXX operations.
The following critical aspects were covered as XXXX of XXX XXXXXXXX Reference XXXXXXXXXXXXX:
XXXXXXXXXXX XX a XXXXXXXXXXX XXXX XXXXXXX and XXXXXX XXXXXXXX for all XXXXXXXXX XXXX proper XXXX XXXXXXXXXXXXXX XX XXXXXX XXX right XXXX XX XXXXXXXX only XX XXX XXXXXXXXXX professional.Filter XXXXXXXX: Based XX predefines XXXXXXX and XXXXXXX codes, XXX XXXX storage XXXXXX proposed in XXX solution XXX different filter levels XXXX provide limited XXXXXX XX XXXX professionals XX XXX data stored XX XXX XXXXXX as per the XXXXXXXXX and eligibility XX XXX XXXXXXXXXXXX XXX accessing the XXXXXXXXX XXXX. XXX filters and XXXX XXXXXXXXXXXXXX XXX be XXXXXX XXXX applicable NASA XXXXXXXX XX ensure accuracy.XXXXXX XXXXXX-check XXXXX: User authentication XXX a major XXXXX in the existing model, XXX the proposed solution resolves it with a XXX-step XXXXX credentials XXXX XXXXXX XXXXXX XXX XXXXXXXXX XXXXXXXXXXXXXX, if required.An online XXXXXXXXXXXXX and XXXXXXXXXXXXX ticketing system XX XXXXXXX user queries XXXX XX set XX to help NASA users XXXXXXX XXXXXXX XXXXXXXXXX XXXX enterprise-wide XXXXXX XX XXX XXXXXX, data and their XXXXXX.
Constraints and Assumptions
While proposing any RA there’s always a XXXX to look XX the XXXXXXXX factors that XXX be considered XX a XXXXXXXXXX XXX the XXXXXXXXXXX XXXXXXXXXXX and accurate XXXXXXXXXXXXXX XX the solution.
XXX portal XXXX XXXX XX take due XXXXXXX for:
Data XXXXXXXXXXFirewallsThreat modelling: XXX XXXXXXXX XXXXXXXX, being part of a SaaS (XXXXXXXX as a XXXXXXX architecture, will XX XXXXX XXXXXX XXXX seamless XXXXX XXXXXXXXXXXXX XX XXXXXXXXXX XXXXXX XX authorized XXXXXXXXX XXXXX XX the XX. As XXXX, cloud cyber security threat vulnerabilities might XXXX a challenge to XXXXXXXXXX XXXXXXXXX XX the XXXXXXX, which needs XXXXXXXX XXXXXXXXXX XXX XXXXXXXXXXXXX.Managing and XXXXXXXXXX XXXXX forms XX XXXXXX XXXXX, including SQL XXXXXXXXX, XXXXXXX XXX XXXXX errors, shell XXXXXXXXX , etc. in XXX proposed modelFinancial XXXXXXXXXXX XXXXXXX in the XXXXXXX XXXXXX
Images Not Shown
-
Assumptions
XXX XXXXXXXX XXXXXXXX reference architecture XXXXX takes XXXX account an array XX XXXXXX XXXXX XXX assumptions XX NASA’s XXX XXXX XXXXXXXXXXXXX scales XX and feels XXX XXXXX to do more XXXX its XXXXXXXX data management, storage XXX XXXXXXXXXXXX XXXXXXXXXXXXXX. The XXXXXXXXXXXXX can be XXXXXXX, XXXXXXX, certain scope XX future change XXX inclusion that might XX XXXXXXXX in XXX XXXXX of XXX proposed XXXXXXXX XXX consider XXX following:
XXX XX XXXX XXXXX XXXX to XXXX XXXX XXXXXXXXX, XXXXXXX XXXXXXXX like checkpoint firewalls, XXXXXXXX XXX XXXXX-point email securityThey might XXXXXXX XXXXXXXX XXXXX and store XXXXXXXX accounts for private third-party vendors, XXXXXXXXXX, etc.IT XXXXXXXXXXXXX XXXXXXXX expansion
-
Alignment Priority Areas
XXXXX XXXXXXXXX this XXXXXXXX reference XXXXXXXXXXXX XXXXXX for the XXXXXXXX XXXXXXXX to simplify employee XXXXXXXXXXXXX along with upholding the data XXXXXXXX aspect XXXXXXX XXXXXXXXXXXXXXX XXX XXXX theft at bay, XXX key XXXXXXXXXX XXX be defined as following:
XXXXXXXXXX a centralized XXXXXX for collaborative XXXXAssigning XXXX XXXXXXX XXX XXXXXXX access to XXX portal XX per employee XXXXX and XXXX XXXXXXXXXXXXImplementing XXXXX-phase user XXXXXXXXXXXXXX system to thwart unwanted XXXXX-in or XXXXXX of XXX XXXXXX by unauthorized XXXXXXXXXXXXXXXXXXXXXXX data while XXXXXXXXXXXX XXXX the network to XXXXX exploitSetting XX cloud security XXXXXXXX XX XXXXXXX XXXXXXXXXXX decryption XXXX XXXXXXXXX XXXXXXXXXXXXXXX up redundant XXXXXXXXX XX prevent XXXXXXXX XX XXXXXXXXXXXX, XXXX XXXXXX, XXXXXXXXXXX, XXXXXXXXX, modification, XXX.XXXXXXXXXXXX XXXXXXXXX, automated data backup measures to XXXXX XXXXX XX XXX unwanted data loss eventsXXXXXXXXXXXX XXXXXXXXX system to ensure user XXXXXXX are resolved in a XXXXXX and XXXXXX XXXXXXXXXX important, implementing secure XXXX XXX stable XXXXXXXXX XXXXXXXXX to XXXXXXXX risks XXXXXXXXXX with shell XXXX XXXXXX, scripting, XXXX hacking, XXXXXXXXXXXXX, XXX. XXXX XXXXX lead XX loss XX XXXX.
XXXX
Data storage XX the XXXX XXXXXXXXX consideration of the proposed XXXXX that will be XXXXX XX a .XXX XXXXXXXXX. Ensuring data integrity XX XXXXX data duplication, XXXXXXXXX, theft, misuse, decryption, loss, XXXXXXXXXXXX, XXX. XX critical XXXXX XXX XXX at XXXX is its most sensitive XXXXXXXX a data XXXXXXXXXXXX event XXX prove XXXXXXXXXX.
-
XXXXXXXXX
The XXXXXXXXX used for this project is .Net XXXXXXXXX. XX XX a XXXXXXXXXXXXX XXX XXXXXXXXXX programming XXXXX for the application XXXXXXXXXXX that XXXX visually stunning XXXX XXXXXXXXXXX XXX XXXXXX communication XXX ability XX XXXXX a range XX XXXXXXXX processes. XXXX the continuous change and XXXXXX in XXX technology XXXXXX, .Net framework XX used to XXXXXX XXXXXXXX XXX web XXXXXXXXXXXX.
To build a XXXXXX application, .XXX XXXXXXXXX XX best for authentication and XXXXXXXXXXXXX. It XXXXXX XXXXXXXXXXXX XXXXXXXX for various issues XXXX XXXXXX XXXXXXXXXX, security and exceptional handling XXXX a developer may XXXX during XXX XXXXXXXXXXX of XXXX XXXXXXX. The windows XXXXXXXXX thoroughly monitors the web XXXXX, XXXXXXXX XXXXXXXXXX XXX applications XXXXXXX over it.
XXX XXXX storage and other XXXXXXXXXX parts, Hadoop is XXXX. XX is an XXXX XXXXXX XXXXXXXXX comprising XX XXX main parts, data XXXXXXX XXX processing XXXX. Storage XXXX is XXXXXX XXXXXX XXXXXXXXXXX XXXX XXXXXX (HDFS) and XXXXXXXXXX part is XXXXXX XXXXXXXXX. As we XXXX XXXXXXXX is a XXXXX aspect XX XXX application. XX any XXXXX XXXXXX or XXXXXXXXXXXX XXX XXXXXX to multiple XXXX, it XXXXX XXXXX harm to XXX organization. MapReduce XXXXX with XXXX XXX XXXXX XXXXXXXX that allows only XXXXXXXX XXXXX XX XXXXXXX on data XXXXXX in the system.
XXXXX XXXXXX XX work XXXX XXXXXXXXX XX that it divide XXXXX in a manner XXXX allows their XXXXXXXXX in XXXXXXXX to run entire XXXXXXX in XXXX time. XXXX is XXXX XXX large XXXX sets XXXXX XX XXXXXXXXXX XXXX XXX cost effective. Hadoop also XXXX XXXX relational database XXXXXXXXXX systems XXXX it XXXXX to the XXXXXXXXXX of large XXXX clusters. Finally, XXXX businesses have already XXXXXXXX XXX XXXXXXX XXXX Hadoop holds and it XX imperative XXXX its XXXXX to XXXXXXXXXX will XXXX as unstructured XXXX keeps XXXXXXX.
XXX XXXXXXXXXXX XXXXXXXXXX Infrastructure Library (ITIL) XX a XXX XX concepts and techniques for XXXXXXXX information XXXXXXXXXX (XX) infrastructure, development, and operations. XXXX provides a systematic XXX XXXXXXXXXXXX approach to the management of IT XXXXXXX provision. It has XXXX benefits including XXXX XXXX, XXXXXXXX productivity, standard and XXXXXXXX, improved XXXXXXXX satisfaction XXXXXXX professional approach and improved XXXXXXXX XX XXXXX XXXXX services by XXXX XXXXXXXXXXXXXX.
XX risk XXXXXXXXX is XXXXX for IMS XX XXXX so, the Information XXXXXXXX XXXXX XXX XXXXXXX XXXXXXXXXXX (XXXXX) XXXXXXXX the XXXXXXX Objectives XXX XXXXXXXXXXX Related Technology (COBIT) XXXXXXXXX XX XXXXX XX XXXX XXXXXXXXX in financial XXXXXXXXXXXXX. It XX XXXX commonly XXXX. XXXX the latest revision, COBIT XXX evolved to XXXXXXX XXXX practices for aligning information technology XXXXXXXXX and processes, XXX linking XXXX XX XXXXXXXX strategy.
-
Storage
Data storage XXX XXXX XXXXXXXX are XXXXX XX NASA. The proposed XXXXXXXXXXXX XXXXX best XXX XX advanced XXXXXXXXXXXX, XXXX encryption and XXXXX XXX XXXXXXXXXX protocols XX XXXXXX XXX XXXXXXXXX things are XXXXX XXXX XX XXXXXXX XXXXXXXXXX new XXXX or accessing existing data:
XXX data will XX XXXXXX?XXX XXXX have access XX XXX XXXX? XXXHow XXXX XXXX XX able to XXXXXX XXXX?
Research ethics XXX all about unanticipated XXXXXX - so we need XX plan XXXXX for XXX XXXXXXXXXX and undesirable XXXXXX (XXXX XX XXXXXXX a XXXXXX logged in, misplacing or XXXXXXXXXXXX XXXXXXX login credentials XXXX someone, or XXXXXX a USB XXXXX). XXX proposed model XXXXX XXXX account the systems NASA IMS can put in place XX XXXXXXX its XXXXXXXXXXXX, XXXXXX XXX stakeholders XX XXXXXXXXX XXXX XXXX happens.
XXXXXX XXXXXXXXXX and XXXXXXXXXX XXX solve a XXX of XXXXXX. Encrypting passwords in XXXXXX form XXXXX XXXXXX ambiguity and XXXXXXXXXXX security. Other XXXXXXXXX XXXX this proposed model XXXX XXXXXXX XXX include:
XXX needs XX XXXX XXX access XX XXXX data?Will XXX XXXX XX XXXXXXXXXX prior they are XXXXXX?XXX will XXXXXXXXXX XXXXXXXXXXXX data be stored?XXXXX XXXX XXX XXX be XXXXXX?
The XXXXXXXX solution XXXX ensure maximum data XXXXXXXXX, taking into XXXXXXXXXXXXX the XXXXXXXXX XXXXX XXXXXX:
Protecting transaction XXXX and XXXX
Data stored in XXXXXXXX in XXX XXXXXXX XXXXXX, which XXX XXXXXXX XXXXXXXXXXX logs as XXXX XX XXXXX XXXX XX XXXXXXXXX information, XXX have varying XXXXXX, XXX that’s XXX enough. For XXXXXXX, the transfer XX data XXXXXXX XXXXXXX levels provides the IT XXXXXXX a proper insight XXXX the data that XX being XXXXX. Data XXXX XX XXXX XXXXX continuously XXXXXXXXXX XXX increased, XXX scalability XX well as availability makes XXXX-tiering necessary XXX XXX XXXX storage management. However, new XXXXXXXX are being XXXXX to big data XXXXXXX XX the auto-XXXXXXX XXXXXX doesn’t XXXX XXXXX of data storage location.
Validation, filtration of the XXXXX XXX-point XXXXXX
End-XXXXX XXXXXXX in XXXXXXX are XXX XXXXX factors XX maintain XXX data. Storage, as well as processing and XXXXXXX XXXXX necessary tasks XXX XXXXXXXX with XXX assistance XX XXXXX XXXX, which XX delivered XX end-points. XXXXXXXXX, XXX XX XXXX must ensure to use an authentic XX well as legitimate end-point devices.
Securing distributed XXXXXXXXX XXXXXXXXXXXX XXX other XXXXXXXXX
Computational security XX well XX XXXXXXX other digital XXXXXX in any XX distributed XXXXXXXXX such as XXXXXXXXX function of XXXXXX, typically XXX short of security XXXXXXXXXXX. XXX two XXXXXXXXX preventions for it can XXXXXX XX understood as XXXXXXXX the mappers XX XXXX XX XXXXXXXXXX the XXXX in XXX XXXXXXX of XXX XXXX of unauthorized mapper.
-
XXXX XXXXXXXXX
XXXXXXXX, protecting XXXX in XXXX XXXX related XX data XXXXXXXXX XXXX XXXXXXXXX. XXX to large XXXXXXX XX data generation, most large XXXXX enterprises such XX XXXX are unable XX maintain any XXXXXXXX type XX regular checks. XXXXXXX, it is most helpful to perform XXXXXXXX checks XX XXXX as standard XXXXXXXXXXX in XXXX time or XXXXXXXX almost in real XXXX.
XXXXXXXXXX XXXXXX control methods for XXXXXXXXXXXXX, XXXXXXXXXX
X secured device for data storage XX an intelligent XXXXXXX so as XX safeguard XXX XXXX. XXX, XXXXX XXXX repeatedly XXXX XXXXXXX devices are highly XXXXX XXX XXXXXXXXXX, it is essential XX XXXXXXX XXX XXXXXX XXXXXXX methods effectively and the XXXXXXXX XXXXXXXX XXXX it in high XXXXXXXXX.
Data provenance
XXX classifying XXXX, it XX essential XX be XXXXX of XXX XXXXXX XXX XXXXXXXXXXX XXX XXXX XXXXXX precisely XX well XX accurately, XXXXX XXXX XXXXXXXX that XXX XXXXX XXXXXXXXXXXXXX, validation XXX XXXXXX XXXXXXX XXX XX XXXXXX.
XXXXXXXX auditing
Analyzing XXXXXXX types XX logs XXX be beneficial XXX XXXX information can be obliging in recognizing any XXXX XX XXXXX-XXXXXX or XXX special XXXX of XXXXXXXXX activity. Therefore, XXXXXXXX XXXXXXX auditing XX XXX proposed XXXXXX can XX XXXXXXXXXX.
Granular XXXXXX control
XXXXXXXX XXXXXX XXXXXXX XX XXXX XXXX in the proposed .XXX XXXXXXXXX can XX done within the framework architecture or using XXXXXXXXX XXX of database such as XXX XXXXX databases or XXX XXXXXX Distributed XXXX System XXXXX XXXXX a robust authentication XXXXXXX XX XXXX XX XXXXXXXXX access control.
Software
An XXXXXXXXXXX XXXXXXXXXX XXX Security system XXXX at NASA would be a set XX XXXXXXXX XXX procedures XXX XXXXXXXXXXXXXX XXXXXXXX NASA’s sensitive data. The goal is to minimize risk XXX ensure business XXXXXXXXXX by XXX-XXXXXXXX XXXXXXXX the XXXXXX of a security breech. This system XXXXX XXXXXXXXXXXXXXX, XXXXXXXXX, XXX XXXXXXXXXXXX XXXXXXXXXX XXX data and XXXXXXXXXXX XXXXXXX, XX XXXXXXX XXXXXXXX recovery XXX XXXXXXXXXX of XXXXXXXXXX for systems, in order XX support XXX XXXXXXXX continuity XXXXXXXXXXXX of critical XXXXXX XXXXXXXX and XXXXXXXXX. The IMS develops XXX maintains an XXXXXXXXXXX XXXXXXXX XXXXXXX XXXX ensures consistent security policy, XXXXXXXXXX XXX implements risk-XXXXX XXXXXXXX controls, XXX XXXXXX XXXXXXXX metrics XX XXXXX compliance XXX effectiveness.
For this, XXXXXXXXX XXXXXXXXXXXX XX 3-tier architecture. XX has three XXXXXX, XXXXXXXXXXXX XXXXX, XXXXXXXX layer or Business XXXXX and Data Access XXXXX.
XXXXXXXXXXXXX Layer sends content XX XXXXXXXX in the form of HTML/XX/CSS. This might leverage frameworks like XXXXX, XXXXXXX, Ember, XXXXXX, XXX.
XBusiness Logic XXXXX uses an application XXXXXX and XXXXXXXXX the XXXXXXXX logic for the application. XXXX would XX written in .XXX framework.
XData XXXXXX XXXXXXX a XXXXXXXX XXXXXXXXXX XXXXXX that provides access XX application XXXX. XXXX XXXXX be XXXXX, MySQL, XXXXXX, or XXXXXXXXXX, Mongo, XXX.
Presentation XXXXX
The presentation XXXXX or user interface XXXXX XXXXXX many aspects. XXXX than XXXX a XXXXXXXXXX XX XXXXXXXXX XX XXX XXXXXXXXX XX widgets on XXXXXXX, it covers XXXXXXX XX XXXX XXXXXXXXXX selection XXX evolution to XXXXX XXXXXXXXXXXX.
XXXX are some presentation XXXXX XXXXXXXXXX:
XXXX interface (XX) components. User XXXXXXXXX components provide a XXX for users to XXXXXXXX XXXX XXXX application. XXXX render XXX format XXXX XXX XXXXX XXX acquire XXX XXXXXXXX data XXXXXX in XXXX XXXX.User process XXXXXXXXXX. User process XXXXXXXXXX help XXXXXXXXXXX XXX orchestrate user interactions. XXXX way the XXXXXXX XXXX and state XXXXXXXXXX logic XX XXX XXXX-coded in XXX user interface XXXXXXXX XXXXXXXXXX, XXX XXX XXXX XXXXX XXXX interaction patterns XXX XX XXXXXX by multiple user interfaces.
XXX XXXXXX XXXXXXXXXX means XXX XXXXXXXX interfaces XXXXXXX XXX XXXXXXXX and XXXXXXXXXX else XXXXXX the XXXXXX XXXXXX, which XXXXXXXX XXXX interfaces, hardware XXXXXXXXXX XXX XXXXXXXX XXXXXXXXXX. XXX following XXXXXXXXXXXXXXX determine other XXXXXXXXXXXXXXXX XXX XXXX XXXXXXXXX components:
XXXXXXXXXX, XXXXX masking, XXX XXXXX XXXXXXXXXXX controls for XXXX inputManaging XXXXXX layouts, styles, and the XXXXXXX appearance XXX navigation XX the applicationEncapsulating XXX XXXXXX of XXXXXXXXXXXXX XXX localizationFormatting data XXX displaying it in XXXXXX visual XXXXXXBrowsing, searching, XXX XXXXXXXXXX displayed data
XXX XXXXX tools XXXX XXX designing user XXXXXXXXX are:
XXXXXXX
|
Technology
|
Layout
|
HTML/CSSBootstrapAngular JSXXXXX
|
-
XXXXXXXX XXXXX Layer
It is the domain logic or main XXXX of the XXXXXX that XXXXXXX XXXX XXXXX business rules which determines how data can be created, XXXXXX and changed. X business logic XX XXXXXXXXX XXX programming XXXX XXXX manages communication between user interface and database. Business XXXXX XXX workflows are XXXXX XXXXXXXXXX of XXXXXXXX logic. Others XXX:
XXXXXXXX components. XXXXXXXXXX business rules XXX XXXXXXX XXXXXXXX tasks.XXXXXXXX workflows. Defines XXX XXXXXXXXXX long-XXXXXXX, XXXXX-step business processes. They XXX XX XXXXXXXXXXX XXXXX XXXXXXXX XXXXXXX management tools.XXXXXXXX entity components. XXXXXXXXXX actual XXXXXXXX XXXXXXXX (for example products or orders). XXXX XXX XXXX to XXXX XXXX XXXXXXX components. They'XX XXXXXXX XXXX structures (such as DataSets, XXXXXXXXXXX, or XML XXXXXXX), but XXXX XXX also be XXXXXXXXXXX using XXXXXX XXXXXX-XXXXXXXX classes.
XXX XXXXXXXX logic XXXXX is XXXXXXXXXXX XX XXX XXXXXXXXXX used to interact XXXX how data is XXXXXXXXX.Business XXXXX is XXXXX mistaken XXX something XXXX XXXXXXXXXXXX XXX XXXXXXXX rules XXXXXXXXXXX in a XXXXXX. XXXXX is an XXXXXXXXX difference XXXXXXX XXXXX two. XXXXXXXX XXXXX XXXXXXXXXX XX formal XXXXXXXXXX of business XXXXXX, XXXXX business XXXXX determines how XXXX XXXXXX is XXXXXXXXXXX XX a XXXXXXX. XX XXXXXXXXX XXXXXX, it XX XXXXXXXX part of a XXXXXX i-e the XXXX where we create XXXX world business XXXXX. XX code XXXXX rules, we XXXX XXXX technologies which helps XX XXXXXXXX XXXX system.
XXXXXXX
|
Technology
|
Development
|
XXX.NET
|
-
Data XXXXXX Layer
XXX last and XXXXX XXXXX of the 3-XXXX XXXXXXXXXXXX is Data Access Layer. XX XXXXXXXX simplified access to XXXX XXXXX XX XXXXXX in XXXX kind of storage XXXX as, XXXXXX XXXXXXXXXX database. XXXX layer XXXXXXX the XXXXXXXX storage XXX retrieval XX data. XXXX are some XXXXX XXXXXXXXXX XX XXXX XXXXX:
Data access XXXXX XXXXXXXXXX. XXXXXXXXX XXX XXXXX necessary to access. Doing so XXXXXXXXXXX XXXX access XXXXXXXXXXXXX and XXXXX it easier XX XXXXXXXXX and XXXXXXXX.XXXX Helpers / XXXXXXXXX.Service agents. Helps XX XXXX XXXXXXXX XXXXXXXX. XXXX XX so by XXXXXXX the XXXXXX XX the data exposed XX the XXXXXXX XX XXX XXXXXX application XXXX, as XXXX as XXXX manage the XXXXXXXXX XX XXXXXXX the service
XXXXXXXXX, a XXXX access XXXXX is just code we XXXXX XX interact XXXX XXX data source. XX, it XXX XX as complex or as simple as XXXXXX. XXX application XXXXX XX XXXXXXX XXX following database XXXXXXXXXX:
XXX new user to user tableDelete XXXX from XXXX tableView XXXX XXXXXXXXXXX XXXXXXXXX in user tableXXXXXX XXXX XXXXXXXXXXX in user table.
XXX XXXXXXXXX XX the Data Access XXXXX is XX XXXXXXX data to business XXXXXXX. XX XXXXXXXXXX XXXX XXXXXXXXX, common XXXXXXXXXXXX XXX used, which are XXXXX below:
Purpose
|
XXXXXXXXXX
|
Data XXXXXXX
|
HadoopXXXXX XXXXXXXX
|
Technical XXXXXXXXX
XXXXXXXXX XXXXXXXXX are basically refers as how XX XXXXXXXX a XXXXXXXXX XXXXXXXXXXX. It describes XXX XXXXXXXXX guidance XXX XXXXXXXXX XXXXXXXXXXX XXX a XXXXXXX area. Due to XXXXXXX evolving technology, XXXXXXXXX positions are likely to XXXXXX XXXXX XX XXXX up with XXXXXXXX. XXXXXXXX XXXXXXXX, standards, XXXXXXXXXX, XXXXXXXX XXXXX, communication protocols, XXX services, XXX namespaces, XXXX quality, XXX. XXX XXX XXXXXXXXX XXXXXXXXX that must XX XXXXXXXXX and addressed in Reference Architecture.
The XXXXXXX XXXXXXXXX structure for .XXX XXXXXXXXX is XXXXX below:
Images Not Shown
Each position XX XXX XXXXXXXXXXX XXX XXXX way XX XXXXXX them XXXXX XX in table. XXXXX below is showing XXXXXXXXXXXX from top to bottom order:
XXXXXXXX
|
XXXXXXXXXX
|
|
XXXXXX to access XXXX system
|
|
HTML/XXX XXX layout
|
|
XXXXXXXXX for layout designing
|
|
XXXXXXX XX XXX designing XXX XXXXXXXXXXX template XXXX XXXX XXXXXXX at XXXXXX side
|
|
XXXXXXXXXX for XXXXXXXXX web XXXXX also.
|
|
.XXX XXXXXXXXX, for XXXXXX implementation.
|
|
XXX for XXXXXXXXXXX XXXXXXXXXXXXXXX.
|
|
Hadoop, for XXXX XXXXXXX
|
|
XXXXX for data storage also.
|
|
MapReduce, XXX data XXXXXXXXXX
|
">