As the 21(st) century progresses, computer systems have become a target for a new type of criminal who attacks software with malicious intent. Failure Modes and Effects Analysis, which is normally used to improve syst...
详细信息
ISBN:
(纸本)9781424414604
As the 21(st) century progresses, computer systems have become a target for a new type of criminal who attacks software with malicious intent. Failure Modes and Effects Analysis, which is normally used to improve system reliability by identifying and mitigating the effects of potential system failures, provides a basic framework that can be applied to counter the threats a computer system will encounter in its operational environment. The process consists of: 1) becoming familiar with the system and system components;2) developing a threat model by identifying external dependencies and security assumptions;3) identifying and classifying the types of threats to the system;4) determining the effects of the threat;and 5) making changes to counter the potential threats. This approach ensures that the assessment of the threat will be done in a systematic and meticulous manner that is more likely to result in a secure and reliable system.
In component based developments, precise specifications and rigorous verifications strongly support to prevent unexpected failures caused by software components. For developing an application with third-party software...
详细信息
ISBN:
(纸本)9781467365376
In component based developments, precise specifications and rigorous verifications strongly support to prevent unexpected failures caused by software components. For developing an application with third-party software components, formal methods provide effective ways to ensure the software quality. In this paper, we describe a development of web based dictionary system by connecting with several online resources, and how it is developed by using SOFL: a formal specification language and method. The requirements analysis is carried out by means of writing an informal specification and then refining into a semi-formal specification. The design specification is formally constructed using the formalized data flow diagrams and the associated modules. We also discuss the implementation of the system and explain the details of a testing conducted for the quality assurance of the system.
This paper presents a practical and formal approach to analyze security-centric information flow policies at the level of the design model. Specifically, we focus on data confidentiality and data integrity objectives....
详细信息
ISBN:
(纸本)9781728105284
This paper presents a practical and formal approach to analyze security-centric information flow policies at the level of the design model. Specifically, we focus on data confidentiality and data integrity objectives. In its guiding principles, the approach is meant to be amenable for designers (e.g., software architects) that have very limited or no background in formal models, logics, and the like. To this aim, we provide an intuitive graphical notation, which is based on the familiar data flow diagrams, and which requires as little effort as possible in terms of extra security-centric information the designer has to provide. The result of the analysis algorithm is the early discovery of design flaws in the form of violations of the intended security properties. The approach is implemented as a publicly available plugin for Eclipse and evaluated with four real-world case studies from publicly available literature.
Over the years, the demand for water refilling station has increased. To cope with the increasing demand, these small establishments need to become more efficient. This study aims at providing water refilling stations...
详细信息
ISBN:
(数字)9781728167855
ISBN:
(纸本)9781728167855
Over the years, the demand for water refilling station has increased. To cope with the increasing demand, these small establishments need to become more efficient. This study aims at providing water refilling stations an inventory management system to allow owners to monitor their items regularly. A detailed interview was conducted to gather the necessary data needed to create the new inventory system by utilizing information system tools. Information system is a software which will help organize and analyze the data by turning raw data into useful information.
In the past two decades there has been a continuous change in the software development. Organizations use different programming languages for developing different software applications. The applications which were dev...
详细信息
ISBN:
(纸本)9783642225765
In the past two decades there has been a continuous change in the software development. Organizations use different programming languages for developing different software applications. The applications which were developed earlier were based on procedural programming languages like 'C', FOR-TRAN. COBOL etc. The applications which are being developed now. may be based on object oriented languages or procedural languages or a mix of both. In order to understand how the information system is designed one may need to understand the behavior of the program. The behavior of the program can be understood with the help of design information. This design information about the application program can be abstracted the from data flow diagram. In this paper we are proposing a methodology to abstract the behavior of the program and then representing this behavior in the form of a data flow diagram through a series of steps.
In this paper, we will introduce some of the problem areas that software engineers are susceptible during the creation of assurance cases, based on the author's educational experience with assurance cases. To miti...
详细信息
ISBN:
(纸本)9783642550324;9783642550317
In this paper, we will introduce some of the problem areas that software engineers are susceptible during the creation of assurance cases, based on the author's educational experience with assurance cases. To mitigate these problems, assurance case patterns are proposed based on data flow diagrams that help engineers develop assurance cases by reusing those patterns. It is also shown an evaluation result of assurance case pattern application to develop an assurance case for a smart card application system.
Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall ...
详细信息
ISBN:
(纸本)9781538647103
Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall functions of dashcam using data flow diagram and STRIDE analysis. After that, we found that dashcam's vulnerabilities are closely related to Wi-Fi function and lack of authentication process. We made sets of possible attacks and presented as attack trees. Attack Tree Analysis was used to categorize and prioritize among several ways of possible attacks. This research contributes to suggest vulnerabilities of a dashcam. This emphasizes the importance that information security standards of dashcam should be made and manufacturers of dashcam should apply the standards.
Air pollution is growing at an alarming rate across India, with urban regions in particular caught in the toxic web. Although there are stringent acts and regulations for air quality, proper information on air quality...
详细信息
ISBN:
(纸本)9781467318259
Air pollution is growing at an alarming rate across India, with urban regions in particular caught in the toxic web. Although there are stringent acts and regulations for air quality, proper information on air quality is not available round the clock. This work looks at the requirements for the design of a genuine air quality information system. Peri-urban regions of Howrah, with its cluster of foundries and other age-old industries located within densely populated residential zone, is considered as a case study. Air quality data available for this zone is analyzed and compared with that of other Indian cities. The prospects of designing an information system to monitor air quality of this region is explored in the study.
This thesis focuses on the new product process, information that is created in it and its flow. The process owner is product planning organization in a steel company. Four years ago a lot of valuable information was l...
详细信息
This thesis focuses on the new product process, information that is created in it and its flow. The process owner is product planning organization in a steel company. Four years ago a lot of valuable information was lost in the personnel reductions after a merge. The literature review studies organizational learning and forgetting, tacit knowledge management and process models. Research strategy is case study. Using literature review, company's internal documents and arranged workshops the current state of the new product process is described and a data flow diagram is drawn. Based on the data flow diagram and literature review de- velopment suggestions are given to be able to develop the process by the principles of learning organization and tacit knowledge management. As a result there is information on the new information that is created during the new product process, what IT systems are used to transfer the information and which organi- zations are taking part in the process. In addition a result is knowledge how the tacit in- formation could be transferred into explicit and saved and especially how a process model can be utilised in it.
This paper describes how to present different multimedia objects on a Multimedia Abstract Machine with a structural mechanism. The structural mechanism is based on a timed Petri net. We use the features of a Petri net...
详细信息
暂无评论