Paper: On the Criteria to Be Used in Decomposing Systems into Modules

5 June 2020 by Phillip Johnston • Last updated 15 August 2023″On the Criteria to Be Used in Decomposing Systems into Modules” is a classic paper published by David Parnas in the Communications of the ACM in 1972. This paper discusses modularization as a mechanism for improving the flexibility and comprehensibility of a system while allowing the shortening of its development time. The effectiveness of a “modularization” is dependent upon the criteria used in dividing the system into modules. A system design problem is presented and both a conventional and unconventional decomposition are described. It is shown that the unconventional …

To access this content, you must purchase a Membership - check out the different options here. If you're a member, log in.

Security Plan

30 October 2019 by Phillip Johnston • Last updated 24 March 2022A security plan is a written document that outlines your product’s security requirements, threat model, and the steps you will take to make the product secure. A security plan is a cornerstone of embedded device security. You can explore other aspects of embedded security in the main topic. A Process for Creating a Security Plan If you are looking for a process that can be used to create your security plan, see our entry “A Process for Defining Your Device’s Security Requirements”. Capture the outputs of this process in …

To access this content, you must purchase a Membership - check out the different options here. If you're a member, log in.