| Preface | p. xv |
| Fundamentals | p. 1 |
| Components Everywhere | p. 3 |
| The Software Component Revolution | p. 4 |
| Component Space | p. 6 |
| Process, Method, and Notation Assumptions | p. 9 |
| Terminology and Acronyms | p. 10 |
| Summary | p. 10 |
| The Unfinished Revolution | p. 11 |
| The First Software Crisis | p. 12 |
| The Software Factory Regime | p. 13 |
| The Second Software Crisis | p. 14 |
| The Market Regime | p. 15 |
| Le Proces c'est mort! Vive le Proces! | p. 20 |
| Summary | p. 21 |
| For Further Reading | p. 21 |
| Discussion Questions | p. 21 |
| Engineering Design and Components | p. 23 |
| Fundamental Ideas | p. 23 |
| Impact of Software Components | p. 25 |
| Designing with and for Components | p. 28 |
| Summary | p. 33 |
| Discussion Questions | p. 33 |
| Requirements and Components | p. 35 |
| Fundamental Ideas | p. 36 |
| Traditional Requirements Engineering | p. 38 |
| Component-Based Requirements Engineering | p. 42 |
| Summary | p. 47 |
| Discussion Questions | p. 48 |
| Ensembles and Blackboards | p. 49 |
| Fundamental Ideas | p. 50 |
| The Ensemble Metamodel | p. 51 |
| Modeling Ensembles with Blackboards | p. 62 |
| Summary | p. 67 |
| Discussion Questions | p. 67 |
| Model Problems | p. 69 |
| Fundamental Ideas | p. 69 |
| The Role of Toys | p. 71 |
| From Toy to Model Problem | p. 76 |
| Finding the Right Model Problems | p. 80 |
| Repair and Contingency | p. 84 |
| Summary | p. 85 |
| For Further Reading | p. 86 |
| Discussion Questions | p. 86 |
| Managing the Design Space | p. 87 |
| Fundamental Ideas | p. 88 |
| Ensembles, Blackboards, Relations | p. 89 |
| Ensemble Management | p. 91 |
| Component and Ensemble Composition | p. 101 |
| Repository Structure | p. 103 |
| Summary | p. 104 |
| Discussion Questions | p. 104 |
| Storing Competence | p. 105 |
| Fundamental Ideas | p. 105 |
| Packaging with Ensemble Handbooks | p. 108 |
| Automation | p. 111 |
| Summary | p. 112 |
| Discussion Questions | p. 113 |
| The Multi-Attribute Utility Technique | p. 115 |
| Fundamental Ideas | p. 116 |
| Evaluating Components with MAUT | p. 125 |
| Summary | p. 128 |
| For Further Reading | p. 128 |
| Discussion Questions | p. 128 |
| Risk-Misfit | p. 131 |
| Fundamental Ideas | p. 131 |
| Feature and Repair Analysis | p. 135 |
| Component Selection | p. 144 |
| Why Risk/Misfit? | p. 146 |
| Experiences with Risk/Misfit | p. 148 |
| Summary | p. 150 |
| For Further Reading | p. 150 |
| Discussion Questions | p. 150 |
| Black Box Visibility | p. 153 |
| Fundamental Ideas | p. 153 |
| Opportunities for Visibility | p. 155 |
| Probing | p. 157 |
| Snooping | p. 159 |
| Spoofing | p. 161 |
| Static Program Analysis | p. 164 |
| Summary | p. 170 |
| Discussion Questions | p. 170 |
| Case Study | p. 171 |
| The DIRS Case Study | p. 173 |
| Sources of Complexity in DIRS | p. 175 |
| A False Start | p. 175 |
| Regrouping: The "DeepWeb" Approach | p. 176 |
| Implications of DeepWeb | p. 177 |
| Commitments | p. 179 |
| Deceptive Simplicity | p. 181 |
| Summary | p. 186 |
| For Further Reading | p. 186 |
| Discussion Questions | p. 186 |
| Applet Ensemble: The Opening | p. 187 |
| Where are We? | p. 187 |
| Risk Analysis | p. 188 |
| Model Problem | p. 189 |
| Model Solutions | p. 191 |
| Evaluation | p. 199 |
| Summary | p. 201 |
| Discussion Questions | p. 202 |
| Public Key Infrastructure | p. 203 |
| Fundamental Ideas | p. 204 |
| Nonrepudiation | p. 213 |
| Confidentiality | p. 215 |
| Integrity | p. 217 |
| Summary | p. 220 |
| For Further Reading | p. 220 |
| Discussion Questions | p. 220 |
| A Certificate Odyssey | p. 221 |
| Where Are We? | p. 221 |
| Exploring Certificate Space | p. 222 |
| Sustaining the Public Key Infrastructure | p. 232 |
| Evaluation | p. 236 |
| Summary | p. 237 |
| Discussion Questions | p. 238 |
| Applet Ensemble: The Middlegame | p. 239 |
| Where Are We? | p. 239 |
| Repair Analysis | p. 240 |
| Risk Analysis | p. 242 |
| Summary | p. 245 |
| Discussion Questions | p. 245 |
| Secure Applet Ensemble | p. 247 |
| Where Are We? | p. 247 |
| Model Problem | p. 249 |
| Model Solutions | p. 253 |
| For Further Reading | p. 260 |
| Summary | p. 261 |
| Discussion Questions | p. 261 |
| Instrumented Model Problem | p. 263 |
| Where Are We? | p. 263 |
| Model Problem | p. 264 |
| Model Solutions | p. 265 |
| Evaluation | p. 270 |
| Summary | p. 272 |
| Discussion Question | p. 273 |
| Sorbet: A Custom Ensemble | p. 275 |
| Where Are We? | p. 275 |
| Model Problem | p. 276 |
| Model Solution | p. 278 |
| Evaluation | p. 283 |
| Summary | p. 284 |
| Discussion Questions | p. 284 |
| Hardware Components | p. 285 |
| Where Are We? | p. 286 |
| Risk Analysis | p. 287 |
| Realize Confidentiality Model Problem | p. 291 |
| Realize Authorization Model Problem | p. 293 |
| Repair Analysis | p. 302 |
| Summary | p. 303 |
| Discussion Questions | p. 304 |
| Into the Black Box | p. 305 |
| Where Are We? | p. 305 |
| Define Model Problem | p. 306 |
| Model Solution | p. 307 |
| Evaluation | p. 321 |
| Summary | p. 322 |
| Discussion Questions | p. 322 |
| Applet Ensemble: The Endgame | p. 323 |
| Where Are We? | p. 323 |
| Repair Analysis | p. 324 |
| Risk Analysis | p. 326 |
| Summary | p. 326 |
| Discussion Questions | p. 327 |
| Secure Applet Ensemble Redux | p. 329 |
| Model Problem | p. 329 |
| Model Solution | p. 331 |
| Evaluation | p. 342 |
| Summary | p. 344 |
| Discussion Questions | p. 344 |
| Conclusion and Retrospective | p. 345 |
| Multi-Attribute Evaluation | p. 346 |
| Conclusion | p. 349 |
| Retrospective | p. 349 |
| Summary | p. 352 |
| Discussion Questions | p. 352 |
| Onward | p. 353 |
| Getting Started | p. 355 |
| Build a Competence Center | p. 356 |
| Define Your Infrastructure | p. 357 |
| Build an Enterprise Design Handbook | p. 358 |
| Certify Designers and Lead Engineers | p. 359 |
| Summary | p. 360 |
| The Prophecies | p. 361 |
| Bibliography | p. 367 |
| Acronyms | p. 373 |
| Index | p. 379 |
| Table of Contents provided by Syndetics. All Rights Reserved. |