Implementation of a Reference Model of a Typical IT Infrastructure of the Office Network of a Power Utility Company

Total Page:16

File Type:pdf, Size:1020Kb

Implementation of a Reference Model of a Typical IT Infrastructure of the Office Network of a Power Utility Company DEGREE PROJECT IN INFORMATION AND COMMUNICATION TECHNOLOGY, SECOND CYCLE, 30 CREDITS STOCKHOLM, SWEDEN 2017 Implementation of a reference model of a typical IT infrastructure of the office network of a power utility company DIMITRIOS VASILEIADIS KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL ENGINEERING 1 2 Abstract Power utility companies are really important in our daily routine since they provide us with power delivery, which is essential in today's society. With the advance of technology, a lot of the procedures that were being manually done by these companies to deliver electrical power, have been automated and centrally controlled by Supervisory Control And Data Acquisition (SCADA) systems. Therefore, this automation must be protected from external attackers that want to hurt control systems (e.g. SCADA), either by stealing sensitive data or even by getting control of the control system and changing parameters and functions that are essential for the good and healthy function of these systems. Exploiting vulnerabilities in the office network can bring an adversary a step closer in getting access to the control system. It is not sufficient on its own, but the adversary can launch further attacks from there targeting the control system. The aim of this thesis is to construct a reference model of a typical IT in- frastructure of the office network of a power utility company, with a simplified implementation in CRATE. CRATE (Cyber Range And Training Environment) is the environment that was used for the implementation of the thesis, provided by the Swedish Defense Research Agency [FOI]. After the implementation is finished, a SCADA system of an enterprise will be installed in CRATE and will be connected with this office network. Once this is done, the Swedish Defense Research Agency will simulate cyber-attacks in a more complete infrastructure. The point of this thesis is to make the office infrastructure as close to a real en- terprise network, although there with some differentiation, part of it on purpose and part of it due to some limitations. 3 Sammanfattning Elbolags existens ¨aressentiell i dagens samh¨allemed tanke p˚aatt elbolagen levererar el vilket viktiga samh¨allsfunktioner beror p˚a. Idag har avancerad teknologi gjort det m¨ojligtatt konvertera diverse procedurer som tidigare genom- f¨ortsmanuellt f¨oratt leverera elektricitet att genomf¨orasautomatiserat och centralstyrt via systemet Supervisory Control And Data Acquisition (SCADA- system). Det ¨ard¨arf¨orytterst viktigt att skydda det automatiserade systemet fr˚anexterna angripare d.v.s. IT-intr˚angsom vill skada det anv¨andastyrsys- temet t.ex. SCADA-styrsystem. Skada kan ske antingen genom att stj¨ala k¨ansligauppgifter eller f˚akontroll ¨over styrsystemet och ¨andrap˚aparametrar och funktioner som ¨arv¨asentliga f¨orett v¨alfungerande system. Att exploatera s˚arbarheteri kontorsn¨atverk kan m¨ojligg¨oraatt motst˚andarehamnar ett steg n¨armareatt f˚atillg˚angtill styrsystemet. Syftet med denna studie ¨aratt konstruera en referensmodell av en typisk IT- infrastruktur av kontorsn¨atetp˚aett elbolag med en f¨orenkladtill¨ampninginom Cyber Range And Training Environment (CRATE). CRATE ¨aren milj¨of¨or cyber¨ovningarsom tillhandah˚allsav Totalf¨orsvarets Forskningsinstitut (FOI) och som har anv¨ants i denna studie f¨oratt implementera referensmodellen. N¨arreferensmodellen av kontorsn¨atethar implementerats, installeras det ¨aven ett SCADA-system i CRATE, och dessa kopplas tillsammans. D¨armedska FOI kunna simulera cyberattacker i en mer komplett infrastruktur. Syftet med denna studie var att skapa ett s˚apass verkligt kontorsn¨atsom m¨ojligttrots viss differentiering j¨amf¨ortmed verkligheten p˚agrund av bl.a. vissa begr¨asningar. 4 Acknowledgements This thesis has been one of the most rewarding projects I have encountered at KTH and in general in my entire academic career. The knowledge I gained from this thesis in amazing. I would like to thank prof. Mathias Ekstedt for giving me the opportunity to work on this thesis, to get to know the department that he works for, his constant feedback and his support. A man with a great will to assist to the point he can his students and drive them to the best possible outcome. I would also like to thank the PhD candidate, Matus Korman, as he was my supervisor at this thesis. I express nothing but gratitude for the patience he showed to all the questions that I kept asking him, which most of the time felt totally irrelevant with the subject. Of course I would like to thank Mr. Asif Iqbal, a new PhD candidate at the department, that brought a lot of his knowledge at the industry ^a\and not only - upon his arrival, a knowledge that we lack as students. Special gratitude goes to my friends for their support not only these 2 years at KTH, but throughout my entire academic career. The best part comes always at the end and here is the point where I would like to express my family, not only for their financial support all these years, but also for their psychological support that has been a tremendous help, for believing in me in my ups and my downs! Thank you all! 5 Contents Abstract 3 Abstrakt 4 Acknowledgements 5 Contents 7 List of Figures 8 1 Introduction 9 1.1 Introduction to the subject area . .9 1.2 SCADA systems . .9 1.3 Cyber-attacks on SCADA networks . 10 1.4 Corporate environment . 10 1.5 CRATE . 11 1.6 Scope and goal of the thesis . 12 1.7 Thesis overview . 12 2 Background 14 2.1 Literature review . 14 2.2 Relevant concepts . 15 2.3 Protocols . 17 2.3.1 Transport Layer Protocols . 18 2.3.2 Application Layer Protocols . 19 3 Method and Implementation 21 3.1 Method . 21 3.1.1 Validation . 22 3.2 Implementation . 22 3.2.1 Demilitarized zone . 24 3.2.2 Office network . 26 3.2.3 Intranet . 27 3.2.4 Engineering network . 30 4 Data flows 31 4.1 DMZ . 31 4.2 Office network . 32 4.3 Intranet . 32 4.4 Engineering network . 33 5 Discussion and conclusion 34 References 36 A APPENDIX - Virtual machines configuration 40 B APPENDIX - Thesis validation 43 6 C APPENDIX - Data flows source code 45 D APPENDIX - Screenshots from CRATE 46 7 List of Figures 1 Source: 2015 Dell Annual Security Report . 10 2 CRATE Architecture [4] . 11 3 Metamodel of CySeMoL's Probabilistic Relational Model (RPM). - [35] . 17 4 OSI model - Created with [54] . 18 5 RICS-el enterprise - Figure created with [54] . 23 6 The DMZ network of the RICS-el enterprise - Figure created with [54] . 24 7 The Office network of the RICS-el enterprise - Figure created with [54] . 26 8 The Intranet network of the RICS-el enterprise - Figure created with [54] . 27 9 The SCADA network of the RICS-el enterprise - Figure created with [54] . 30 10 Screen-shot of the RICS-el enterprise . 46 11 Screen-shot of the DMZ network of the RICS-el enterprise . 47 12 Screen-shot of the Office network of the RICS-el enterprise . 48 13 Screen-shot of the Intranet network of the RICS-el enterprise . 49 14 Screen-shot of the SCADA network of the RICS-el enterprise . 50 8 1 Introduction 1.1 Introduction to the subject area When we refer to the IT (Information Technology) infrastructure of an en- terprise, we refer to the composite hardware, software, network resources and services that the enterprise uses. IT has become necessary for enterprises to stay competitive. IT provides support to enterprises, it supports communica- tion between people (e.g. mail, VoIP, web servers and browsers etc.), it supports storage of data of different kind (e.g. file systems, file servers, databases etc.), it supports operations of technical administration (e.g. of IT itself) and even supports and actually controls industrial processes (e.g. production facilities, chemical facilities, power companies etc.). Of course IT does more than that. Every modern car relies on tons of IT without which it would not even start the engine. As can be easily understood from the above, IT plays a big part in today's enterprises. This is why many companies have their own IT departments, and many of them have them located in different places, either they have one or many departments. Besides securing the systems and the network of a company from external cyber-intruders, physical security of the servers and the systems could also be required, in order for a company to stay up and running. There have been many attacks in IT systems of companies that led them to a financial and operation loss for either short or a large amount of time. This could either be achieved by attacking directly a system or trying to nest a file or trojan into another system for a while and then attack the targeted system. This can be encountered if the entire infrastructure of an enterprise is modelled and well- defined concerning the connections of its systems between them. It provides the possibility to test the infrastructure for various attacks and prevent them. 1.2 SCADA systems Supervisory Control And Data Acquisition (SCADA) systems have greatly evolved over the last years. From the point where these systems where standalone with custom hardware and with custom software as well, now there are many pieces of software and hardware according to the need of the enterprise. This has led to reducing costs in many sections at companies, including operational and maintenance costs. As a result, SCADA systems are controlling a big percent- age of critical infrastructures worldwide, including nuclear power plants, power transmission, electricity generating plants etc. [1] However, all these benefits of present day's SCADA systems also come with downsides.
Recommended publications
  • Gnucash Set up Return Address for Invoices
    Gnucash Set Up Return Address For Invoices Argentine Simeon never glides so equanimously or sheds any Ghanaians ever. Adger remains true-born after Matthaeus callouses appeasingly or sculpsit any quadrate. Lightfast and unplanned Sergio always set-ups westerly and sugar-coat his peevishness. There is stored in a great article helpful whencreating invoices customer accounts? We will refer back on a good idea of account register with a customer list of an existing application settings are used when bill planning to! You have in transfer money from a report options window are outlined below is there are enabled if your previous commands start with a new button at a methodology which payments. Pacesetters may require you return after microsoft windows build a small business address will get or vat. This may be much everyone for returnable, return user to determine aging report defaults. Create a trick that combines an easy-to-use access-based front-end using. This may go quickly access keys, you refer back on credit purchases such as well as a variety of various tax. With the amount data file one feature to your bank, how much more information you can read it can. The settings for crates that pay. Url tab open a set up on gnucash to address details are looking for credit others who use a qif files described here? Cash you can view and memo is free accounting equation, spanish and these stock with svn using lots sorting and break functionality allows you are not. After creating a document itself, gnucash so if a warning messages because my gnucash set up return address for invoices you.
    [Show full text]
  • Community Notebook
    Community Notebook Free Software Projects Projects on the Move Are you ready to assess your assets and limit your liabilities? Or maybe you just want to find out where your money goes. This month we look at Grisbi, GnuCash, and HomeBank finance managers. By Rikki Endsley his time, it’s personal. My current system of logging into my bank ac- count to see whether my magical debit card still works isn’t working for me, so I’ve decided to test drive some open source finance managers: T Grisbi, GnuCash, and HomeBank. Grisbi First released in French in 2000, the Grisbi accounting program is now available nobilior, 123RF in several languages and runs on most operating systems. To download Grisbi, visit the project’s SourceForge page [1] or homepage [2]. The install and con- figuration is intuitive – select your country and currency, the list of “categories” you’ll use (either a standard category set or an empty list with no categories defined yet), add bank details, and then create a new account from scratch or import data RIKKI ENDSLEY from an online bank account or accounting software. I opted to create a new bank ac- count. Other options include a cash account, liabilities account, or assets account Rikki Endsley is a freelance writer and the community manager for USENIX. In (Figure 1). addition to Linux Magazine and Linux After you set up your account, a window with transactions and properties opens Pro Magazine, Endsley has been (Figure 2). Here you can enter, view, and reconcile transactions; adjust your bank de- published on Linux.com, NetworkWorld.
    [Show full text]
  • Gnucash Tutorial and Concepts Guide
    GnuCash Tutorial and Concepts Guide The GnuCash Documentation Team GnuCash Tutorial and Concepts Guide by The GnuCash Documentation Team This Guide contains a tutorial for using 4.6 and describes the concepts behind GnuCash. Copyright © 2009-2021 GnuCash Documentation Team Copyright © 2010-2011 Yawar Amin Copyright © 2010 Tom Bullock Copyright © 2010-2011 Cristian Marchi Copyright © 2006 Chris Lyttle Copyright © 2003-2004 Jon Lapham Copyright © 2002 Chris Lyttle Copyright © 2001 Carol Champagne and Chris Lyttle Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License (GFDL), Version 1.1 or any later version published by the Free Software Foundation with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. You can find a copy of the GFDL at this link [ghelp:fdl] or in the file COPYING-DOCS distributed with this manual. This manual is part of a collection of GNOME manuals distributed under the GFDL. If you want to distribute this manual separately from the collection, you can do so by adding a copy of the license to the manual, as described in section 6 of the license. Many of the names used by companies to distinguish their products and services are claimed as trademarks. Where those names appear in any GNOME documentation, and the members of the GNOME Documentation Project are made aware of those trademarks, then the names are in capital letters or initial capital letters. DOCUMENT AND MODIFIED VERSIONS OF THE DOCUMENT ARE PROVIDED UNDER THE TERMS OF THE GNU FREE DOCUMENTATION LICENSE WITH THE FURTHER UNDERSTANDING THAT: 1.
    [Show full text]
  • The Kmymoney Handbook for Kmymoney Version
    The KMyMoney Handbook for KMyMoney version 4.6 Michael T. Edwardes, Thomas Baumgart, Ace Jones, Tony Bloomfield, Robert Wadley, Darin Strait, Roger Lum, and Jack H. Ostroff The KMyMoney Handbook 2 Contents 1 Introduction 1 1.1 What is KMyMoney? . .1 1.2 What KMyMoney is not . .1 2 What’s new in this release2 3 Making the most of KMyMoney3 3.1 Basic Accounting . .3 3.1.1 Defining the accounts (personal records) . .4 3.1.2 Defining the accounts (business records) . .4 3.2 Mapping your finances to KMyMoney . .4 3.2.1 Accounts . .4 3.2.1.1 Accounts - Asset . .4 3.2.1.2 Accounts - Liability . .5 3.2.2 Institutions . .5 3.2.3 Categories . .5 3.2.4 Sub-Categories . .5 3.2.5 Payees . .5 3.2.6 Scheduled transactions . .5 3.3 Useful Tips . .5 4 Using KMyMoney for the first time7 4.1 Running KMyMoney for the first time . .7 4.2 The main window . .8 4.3 Creating a new file . .9 4.4 Creating accounts . 15 4.5 Schedules . 16 4.6 Categories . 16 4.7 Payees . 16 4.8 Quicken Interchange Format (QIF) Import . 16 4.9 Searching for transactions . 16 4.10 Reconciliation . 17 The KMyMoney Handbook 4.11 Backing up . 17 4.12 Launching KMyMoney . 17 4.13 Contacting the Developers / Reporting Bugs . 17 4.13.1 Contacting the developers . 17 4.13.2 Reporting bugs . 18 4.13.2.1 Writing High Quality Bug Reports . 18 5 Institutions 19 5.1 Institution Options . 19 5.1.1 New Institution .
    [Show full text]
  • Gnucash Mark Invoice Paid
    Gnucash Mark Invoice Paid Fifty and exact Noel often pose some oxidizations blindly or French-polishes astigmatically. Tonnish Maddie resided her pepinos so jumpily that Cob utilises very digestedly. Marlo is sewed and devastated mighty as monolithic Henderson baksheeshes ignominiously and homologate indoors. Therefore you need to be adjusted vertically by simply zero, gnucash mark invoice paid in the current tab. Display vendor id or year or failure, that are open than invoice when things by offsetting your gnucash mark invoice paid with. It can mark paid to invoice date in the help you! You paid to mark the edit. Consult a mark is broken into your gnucash mark invoice paid software for gnucash metadata has sold that lasts for free? Certify ap in multiple projects and vendors which date for doing that home to display? When you paid to mark income and gnucash mark invoice paid the licensor waives the right. The status surrounding this allows to help you have to gnucash mark invoice paid the invoice? 1041 Filling in the primary name Frequency and Payment information 64. Similar to GnuCash you finally connect other bank accounts to be software. This gnucash objects into cvs, gnucash mark invoice paid to mark is over again. The invoice is impossible to mark invoices to be done by wave makes it is entered? The gnucash without notice the gnucash mark invoice paid and also must also use the bill. This gets tiring and invoicing makes bookkeeping solution, you want to manage the employeesubmits a human resources! The gnucash to delete account setup the gnucash mark invoice paid by! This invoice paid out of! It fairly intentensively in invoices report show accounts receivable until two transactions to mark to adding transactions.
    [Show full text]
  • A Gnucash Tutorial Presentation to Young Professionals CPA Discussion Group 19Th November 2014, Victoria University
    A GnuCash Tutorial Presentation to Young Professionals CPA Discussion Group 19th November 2014, Victoria University http://levlafayette.com Introducting GnuCash GnuCash is free and open source software accounting program, originally designed to have similar functionality to Quicken. It was originally released in 1998 and it under active development (last release 2.6.4 on September 28) with a release schedule up to September 2017. Multiple operating systems and architectures. GnuCash is available for Microsoft Windows XP/Vista/7/8, MacOS X for Intel or PowerPC, and Linux packages on a variety of architectures available for Fedora, Mandriva, RedHat/CentOS, or Ubuntu. There are older packages available for Debian, third-party RPMs for OpenSuSE, and documentation for Slackware, Gentoo, Solaris, and if all else fails, a tarball of the source files is available. Installation is from the following URL: http://www.gnucash.org/download.phtml Introducting GnuCash GnuCash by default stores data in an xml format and stores and reads each country’s special character sets by using UTF-8. Starting with version 2.4, GnuCash financial data can be stored in a SQL database using SQLite3, MySQL or PostgreSQL - all FOSS databases. It uses pure fixed-point arithmetic to avoid rounding errors which would arise with floating-point arithmetic (e.g., Magento). GnuCash is multilingual with the application's menus and popups have been translated to 21 languages. Documentation is available in English, French, Portuguese and Spanish. Excellent documentation; detailed application Manual, and a Tutorial and Concepts guide. There are user mailing lists in seven different languages, a developers mailing list, an announce and patches list.
    [Show full text]
  • Op E N So U R C E Yea R B O O K 2 0
    OPEN SOURCE YEARBOOK 2016 ..... ........ .... ... .. .... .. .. ... .. OPENSOURCE.COM Opensource.com publishes stories about creating, adopting, and sharing open source solutions. Visit Opensource.com to learn more about how the open source way is improving technologies, education, business, government, health, law, entertainment, humanitarian efforts, and more. Submit a story idea: https://opensource.com/story Email us: [email protected] Chat with us in Freenode IRC: #opensource.com . OPEN SOURCE YEARBOOK 2016 . OPENSOURCE.COM 3 ...... ........ .. .. .. ... .... AUTOGRAPHS . ... .. .... .. .. ... .. ........ ...... ........ .. .. .. ... .... AUTOGRAPHS . ... .. .... .. .. ... .. ........ OPENSOURCE.COM...... ........ .. .. .. ... .... ........ WRITE FOR US ..... .. .. .. ... .... 7 big reasons to contribute to Opensource.com: Career benefits: “I probably would not have gotten my most recent job if it had not been for my articles on 1 Opensource.com.” Raise awareness: “The platform and publicity that is available through Opensource.com is extremely 2 valuable.” Grow your network: “I met a lot of interesting people after that, boosted my blog stats immediately, and 3 even got some business offers!” Contribute back to open source communities: “Writing for Opensource.com has allowed me to give 4 back to a community of users and developers from whom I have truly benefited for many years.” Receive free, professional editing services: “The team helps me, through feedback, on improving my 5 writing skills.” We’re loveable: “I love the Opensource.com team. I have known some of them for years and they are 6 good people.” 7 Writing for us is easy: “I couldn't have been more pleased with my writing experience.” Email us to learn more or to share your feedback about writing for us: https://opensource.com/story Visit our Participate page to more about joining in the Opensource.com community: https://opensource.com/participate Find our editorial team, moderators, authors, and readers on Freenode IRC at #opensource.com: https://opensource.com/irc .
    [Show full text]
  • Edit Gnucash Files in Spreadsheet
    Edit Gnucash Files In Spreadsheet Rene is stiff-necked and dipped unsavourily as bothersome Wildon ingenerating orbicularly and medalling unsuspectingly. Pied Nigel forgotten no ophiolater insheathe conventionally after Barbabas inditing ubique, quite servantless. Taxonomic and grumbly Zachery often contextualizes some interferences pitilessly or frees thermochemically. Write to use a different beancount docs say that this spreadsheet in qif format you can i used text accounting activities whose name getting Grisbi provides a Credit Simulator for credit calculations. Qif file must be fully packed interface that it at least open next screen, or edit files in gnucash spreadsheet system works better reporting. It will not take intoaccount prices defined in the price editor. But if you are alsotracking business finances or want to keep data separate for some reason, then you will need more thanone file. You will learn why you might want to give numbers to your accounts and how to go about doing that. It is no guarantee as matching of edit gnucash files in spreadsheet. Price editor will be serious issue is spreadsheet template to edit gnucash files in spreadsheet program files to edit. Add your file in a checkbook against loss is editable in the edit locked in. Part but the Azure SQL family, Azure SQL Database is whether intelligent, scalable, relational database service built for curse cloud. Click OK and save the IIF file somewhere. Wizards walk through. The Transaction Report Sort options allow you to select a Primary Key as well as a Secondary Key. The spreadsheet or edit files in gnucash spreadsheet program. Hopefully a spreadsheet formulas, edit gnucash files in spreadsheet.
    [Show full text]
  • Gnuaccounting Manual
    Gnuaccounting Manual 1/39 Table of Contents 1 Requirements, installation and start...................................................................................5 1.1 System requirements...................................................................................................5 1.2 Installation....................................................................................................................5 1.3 In Windows..................................................................................................................5 1.3.1 With the installer package....................................................................................5 1.3.2 With the Zip-file.....................................................................................................5 1.3.3 In 64bit Windows..................................................................................................5 1.3.4 The portable version for USB-Sticks....................................................................6 1.3.5 Gnuaccounting standalone and OpenOfficePortable...........................................7 1.3.6 Gnuaccounting and LibreOffice............................................................................7 1.4 In Linux........................................................................................................................7 1.4.1 Ubuntu, SuSE.......................................................................................................7 1.4.2 OpenSuSE experimental......................................................................................8
    [Show full text]
  • What Is Open-Source Software, and How Are Fund Managers Using It? (Part One of Three)
    February 21, 2019 TECHNOLOGY What Is Open-Source Software, and How Are Fund Managers Using It? (Part One of Three) By Shaw Horton, Hedge Fund Law Report Open-source software (OSS) is characterized (Jan. 18, 2018); and “Privacy Concerns, Third by licensing arrangements wherein copyright Parties and Drones” (Jan. 25, 2018). holders grant licensees the ability to freely change and distribute that software. Pursuant What Is Open-Source to those licenses, however, licensees must meet certain requirements or follow certain Software? restrictions. These obligations may be minimal, as is the case with permissive licenses, OSS is defined by five major elements, or onerous, as is the case with so-called explained Matt Savare and Bryan Sterba, “copyleft” licenses. OSS exists for virtually any partner and associate, respectively, at application, including artificial intelligence, Lowenstein Sandler and members of its database management and system security. technology practice group. They are: Its ubiquity means that fund managers can leverage OSS for all segments of their 1. free redistribution; businesses. 2. source code availability and the integrity of that code; This article, the first in a three-part series, 3. allowance of derived works; discusses the basics of OSS, actions 4. non-discrimination against persons, governments are taking to support it, relevant groups or fields of endeavor; and regulatory guidance and ways OSS is being 5. the distribution of a technology-neutral used by fund managers. The second article license that is neither specific to a will analyze the benefits of OSS, as well as product nor restrictive of other software. the disadvantages and risks that it presents.
    [Show full text]
  • Developer Dynamics and Syntactic Quality of Commit Messages in OSS Projects Kuljit Chahal, Munish Saini
    Developer Dynamics and Syntactic Quality of Commit Messages in OSS Projects Kuljit Chahal, Munish Saini To cite this version: Kuljit Chahal, Munish Saini. Developer Dynamics and Syntactic Quality of Commit Messages in OSS Projects. 14th IFIP International Conference on Open Source Systems (OSS), Jun 2018, Athens, Greece. pp.61-76, 10.1007/978-3-319-92375-8_6. hal-01875491 HAL Id: hal-01875491 https://hal.inria.fr/hal-01875491 Submitted on 17 Sep 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Developer Dynamics and Syntactic Quality of Commit Messages in OSS Projects Kuljit Kaur Chahal, Munish Saini Department of Computer Science Guru Nanak Dev University Amritsar India [email protected] Abstract. Community dynamics play an important role in the Open Source Software (OSS) development paradigm. Researchers have extensively studied the human aspects of the OSS paradigm from the point of view of community formation to community evolution. A few studies relate community dynamics with OSS product attributes such as code quality. However, the impact of community dynamics on non-code contributions such as commits has not been explored.
    [Show full text]
  • Guida Ai Concetti E Manuale Di Gnucash
    Guida ai concetti e manuale di GnuCash Yawar Amin, Gruppo della documentazione di GnuCash J. Alex Aycinena, Gruppo della documentazione di GnuCash <[email protected]> Tom Bullock <[email protected]> Carol Champagne <[email protected]> Frank Ellenberger, Gruppo della documentazione di GnuCash <[email protected]> Mike Evans <[email protected]> Dave Herman, Gruppo della documentazione di GnuCash <[email protected]> Geert Janssens, Gruppo di sviluppo di GnuCash Jon Lapham, Gruppo della documentazione di GnuCash <[email protected]> Chris Lyttle, Gruppo della documentazione di GnuCash <[email protected]> Cristian Marchi, Gruppo della documentazione di GnuCash <[email protected]> John Ralls, Gruppo della documentazione di GnuCash <[email protected]> Robert Ratliff, Gruppo della documentazione di GnuCash <[email protected]> Christian Stimming, Gruppo della documentazione di GnuCash <[email protected]> Bengt Thuree, Gruppo della documentazione di GnuCash <[email protected]> Guida ai concetti e manuale di GnuCash di Yawar Amin, J. Alex Aycinena, Tom Bullock, Carol Champagne, Frank Ellenberger, Mike Evans, Dave Herman, Geert Janssens, Jon Lapham, Chris Lyttle, Cristian Marchi, John Ralls, Robert Ratliff, Christian Stimming, e Bengt Thuree Questa guida contiene un esempio pratico di utilizzo di GnuCash e descrive i concetti su cui GnuCash si basa. Diritto d'autore © 2009-2015 Gruppo della documentazione di GnuCash Diritto d'autore © 2010-2011 Yawar Amin Diritto d'autore © 2010 Tom Bullock Diritto d'autore © 2010-2011 Cristian Marchi Diritto d'autore © 2006 Chris Lyttle Diritto d'autore © 2003-2004 Jon Lapham Diritto d'autore © 2002 Chris Lyttle Diritto d'autore © 2001 Carol Champagne e Chris Lyttle Diritto d'autore © 2011 Cristian Marchi ([email protected]) Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License (GFDL), Version 1.1 or any later version published by the Free Software Foundation with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts.
    [Show full text]