Ripple effect in the modification of software requirements should be properly analyzed, since it may cause errors of software requirements. We have already proposed a ripple effect analysis method in deletion or updat...
详细信息
ISBN:
(纸本)9789897583797
Ripple effect in the modification of software requirements should be properly analyzed, since it may cause errors of software requirements. We have already proposed a ripple effect analysis method in deletion or update of dataflow requirements. In this paper, we enhance our method considering ripple effect analysis in adding new dataflows requirements. Our method will be illustrated with examples.
this paper aims to provide a service that improves In-stores customer's shopping experience in order to lead stores 'customers' comfort, efficient, and convenient shopping experience by applying images pro...
详细信息
ISBN:
(纸本)9781728101088
this paper aims to provide a service that improves In-stores customer's shopping experience in order to lead stores 'customers' comfort, efficient, and convenient shopping experience by applying images processing technique in an Android mobile application. The proposed project is developing an Android mobile application that uses the phone camera to capture the product's barcode label and also price labels. By using this mobile application, customers and stores both gain improvement. Store's shopper gets full product information immediately and correctly in a convenient and fast way by only scanning the product's barcode then it can translate this information into several languages. Also, this project serves customer shopping experience in calculating the total cost of their purchases while they are shopping in any store and in any gallery by only capturing the written prices' labels.
Keeping a vehicle secure implies provide of a long-term support, where over-the-air updates (OTA) play an essential role. Clear understanding of OTA threats is essential to counter them efficiently. Existing research ...
详细信息
ISBN:
(纸本)9789897583742
Keeping a vehicle secure implies provide of a long-term support, where over-the-air updates (OTA) play an essential role. Clear understanding of OTA threats is essential to counter them efficiently. Existing research on OTA threats often exclude human actors, such as drivers and maintenance personnel, as well as leave aside privacy threats. This paper addresses the gap by investigates security and privacy OTA threats relevant for vehicle manufacturers for the whole product lifecycle. We report on a practical scenario "long term support", its dataflow elements, and outcomes of threat analyses. We apply state of the art approaches, such as STRIDE (extended with an automotive template) and LINDDUN, to an automotive case and consider an automotive-specific UNECE OTA threat catalogue. Outcomes indicate complementarity of these methods and provide inputs to studies how well they address practical automotive cases.
In the last decade, there has been more and more focus on the topic of information privacy, especially considering the ever increasing digital transformations that both businesses and the society are experiencing. As ...
详细信息
ISBN:
(纸本)9781450359337
In the last decade, there has been more and more focus on the topic of information privacy, especially considering the ever increasing digital transformations that both businesses and the society are experiencing. As a right of individuals to "control when, how and to what extent information about them is communicated to others" [29], privacy has become an important expectation of users. A recent study in the EU showed that more than 70% of the citizens are not willing to sacrifice their privacy in exchange for a service [17]. The paradigm of Privacy-by-Design (PbD) [14] has become more important nowadays, which has also become a regulatory requirement by the EU General data Protection Regulation (GDPR), which came into force in May 2018 [2]. PbD as a paradigm defines principles promoting the integration of privacy goals already during the design of an ICT system. However, translating those principles into engineering requirements is seen as a challenge.
This paper presents a practical and formal approach to analyze security-centric information flow policies at the level of the design model. Specifically, we focus on data confidentiality and data integrity objectives....
详细信息
ISBN:
(纸本)9781728105284
This paper presents a practical and formal approach to analyze security-centric information flow policies at the level of the design model. Specifically, we focus on data confidentiality and data integrity objectives. In its guiding principles, the approach is meant to be amenable for designers (e.g., software architects) that have very limited or no background in formal models, logics, and the like. To this aim, we provide an intuitive graphical notation, which is based on the familiar data flow diagrams, and which requires as little effort as possible in terms of extra security-centric information the designer has to provide. The result of the analysis algorithm is the early discovery of design flaws in the form of violations of the intended security properties. The approach is implemented as a publicly available plugin for Eclipse and evaluated with four real-world case studies from publicly available literature.
The de facto status of unified modeling language (UML) remains unaltered even after 20 years of advances in other technologies. The non-ascension in the status indicates some lacuna in UML, though it has undergone up-...
详细信息
ISBN:
(纸本)9789811055447;9789811055430
The de facto status of unified modeling language (UML) remains unaltered even after 20 years of advances in other technologies. The non-ascension in the status indicates some lacuna in UML, though it has undergone up-gradation in subsequent versions. Initially, UML is developed by three amigos to widen the scope and enhance the richness of diagramming languages. The clairvoyant study based on the number of involved diagrams indicates that, instead of unifying the semiotics of all three amigos diagramming languages, the diagrams of three languages are unified, discarding some of the diagrams with apprehension of descension in UML richness. The functional model which is quintessence of any open system has been discarded costing utilities of UML. This paper formulates the richness through logical positivism, unifies the semiotics of participating diagramming languages, and enhances through the reintroduction of modified functional model in the form of work process flowdiagram.
Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall ...
详细信息
ISBN:
(纸本)9781538647103
Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall functions of dashcam using data flow diagram and STRIDE analysis. After that, we found that dashcam's vulnerabilities are closely related to Wi-Fi function and lack of authentication process. We made sets of possible attacks and presented as attack trees. Attack Tree Analysis was used to categorize and prioritize among several ways of possible attacks. This research contributes to suggest vulnerabilities of a dashcam. This emphasizes the importance that information security standards of dashcam should be made and manufacturers of dashcam should apply the standards.
This thesis focuses on the new product process, information that is created in it and its flow. The process owner is product planning organization in a steel company. Four years ago a lot of valuable information was l...
详细信息
This thesis focuses on the new product process, information that is created in it and its flow. The process owner is product planning organization in a steel company. Four years ago a lot of valuable information was lost in the personnel reductions after a merge. The literature review studies organizational learning and forgetting, tacit knowledge management and process models. Research strategy is case study. Using literature review, company's internal documents and arranged workshops the current state of the new product process is described and a data flow diagram is drawn. Based on the data flow diagram and literature review de- velopment suggestions are given to be able to develop the process by the principles of learning organization and tacit knowledge management. As a result there is information on the new information that is created during the new product process, what IT systems are used to transfer the information and which organi- zations are taking part in the process. In addition a result is knowledge how the tacit in- formation could be transferred into explicit and saved and especially how a process model can be utilised in it.
In the virtual training simulation software, users through graphical interfaces to fullfill in-formation exchange. By adopting the method of black box testing, treating the virtual training simula-tion software as a b...
详细信息
In the virtual training simulation software, users through graphical interfaces to fullfill in-formation exchange. By adopting the method of black box testing, treating the virtual training simula-tion software as a black box and input data to drive the software running, could test the interaction of graphical interface. The test case generation method based on data flow diagram(DFD), which is characterized to form a complete set of test cases and cover the entire path of the program, could im-prove the efficiency of the test and ensure the reliability of the test results.
With the increasingly rapid pace of life in today, mobile devices become more and more popular for people, so the development of a cost-effective information management software has good prospects for development on t...
详细信息
With the increasingly rapid pace of life in today, mobile devices become more and more popular for people, so the development of a cost-effective information management software has good prospects for development on the Android platform, database design as the basic work it is also particularly important, this paper studied the database design of music information management software, firstly, studied the requirements analysis of music information management software, with data flow diagram describe the course of its operation;Secondly, studied the database design;finally, studied the software security design of music information management software. database design is good or bad, which directly affects the efficiency of the application and results, therefore, database design of music information management software based on Android platform studied in this paper has great significance for the development of software.
暂无评论