Effective Model-Based Systems Engineering

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and int...

Full description

Bibliographic Details
Main Authors: Borky, John M. (Author, http://id.loc.gov/vocabulary/relators/aut), Bradley, Thomas H. (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2019.
Edition:1st ed. 2019.
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Introduction - Framing the Problem
  • Applying Object Orientation to System Architecture
  • MBSAP Methodology Overview
  • Analyzing Requirements in an Operational Viewpoint
  • Designing in a Logical/Functional Viewpoint
  • Implementing in a Physical Viewpoint
  • Implementing Service-Oriented Architectures for Enterprise Integration
  • Extending Architecture to Real-Time Domains
  • Developing the Network Dimension
  • Protecting Information with Cybersecurity
  • Using Prototypes Verification, and Validation to Evaluate and Enhance System Architecture
  • Using Reference Architectures and Frameworks
  • Architecting the Enterprise
  • Applying Advanced Concepts
  • Implementing Governance to Measure and Maintain Architecture Quality
  • Appendix A - Quick Reference to Object-Oriented Design (OOD) and the Unified Modeling Language (UML)
  • Appendix B - Quick Reference to the System Modeling Language (SysML), Profile of the Unified Modeling Language (UML)
  • Appendix C
  • System Architecture Example: E-X Airborne Multisensor Platform
  • Appendix D - Summary of the Modeling and Analysis of Real-Time and Embedded (MARTE) Systems Profile of UML
  • Appendix E - Listing of Information Technology (IT) Core Standards and Sources
  • Appendix F - Defense in Depth (DiD) Defintions
  • Appendix G - Common Cyber Attack Methods
  • Appendix H - IEEE Computer Society Center for Secure Design (SD) List of Top 10 Security Flaws
  • Appendix I - Software Testing Methods and Tools
  • Appendix J - Open System Interconnect (OSI) Layers and Protocols
  • Appendix K - Service-Oriented Architecture (SOA) Policy Requirements for Department of Defense (DoD) Programs.