RASSP Information Management Appnote

Abstract

In an integrated product development environment which involves several vendor tools, diverse and incompatible configuration management mechanisms and authorization management mechanisms across tools can lead to the inefficiencies in the design process. We describe in this document a common model for configuration management and authorization management that may be adopted by an integrated product development environment. We have specified a common minimal set of configuration management mechanisms that need to be provided by the tools to support the proposed configuration and authorization models. We have completed a pilot implementation of the Configuration management (CM) and Authorization Management (AM) models for the Intergraph Asset and Information Management (AIM) software system. This pilot implementation proves the plausibility and usability of the model.

The RASSP configuration management model supports three types of workspaces -- private, shared, and global. The workspaces are organized hierarchically with global workspaces as the root of the hierarchy, shared workspaces as children of the global workspace, and private workspaces as children of the shared workspaces. The CM model supports three types of versions of design objects -- transient, working, and released. Transient design objects are created in the private workspaces, and when mature for sharing with the other members of the team, are promoted to working versions and checked in to a shared workspace. Once the working version has been thoroughly tested it is them promoted to a released version and checked into the global workspace.

The RASSP authorization management model supports three types of hierarchies -- an authorization object hierarchy, an authorization type hierarchy, and an authorization role hierarchy. The authorization object hierarchy is a composition tree of all the design objects in a project. The authorization type hierarchy is an implication tree, with a node of a certain access privilege implying a set of access privileges below it in the inverted tree. The authorization role hierarchy is also an implication tree with a node representing a certain user role subsuming all the access privileges of the user roles below it in the hierarchy. This hierarchical approach allows an administrator to specify authorizations in a succinct fashion by creating a three-way relationship between a node from each of the three hierarchies.

Purpose

The RASSP tools for information management were used for the RASSP benchmark programs at the Lockheed Martin Advanced Technology Labs. The tools supported a design program involving about ten engineers, and spanned about two years in duration. The metrics we have collected on the design process quantifies the benefits of the RASSP CM and AM tools.

This application note is intended for managers and administrators of design groups who are interested in streamlining the process of building, releasing, and supporting product designs.

Roadmap

1.0 Introduction

2.0 The RASSP Configuration Management Model

3.0 The RASSP Authorization Model

4.0 Implementation of the RASSP Configuration and Authorization Management Models

5.0 Lessons Learned

6.0 References

Approved for Public Release; Distribution Unlimited Dennis Basara