The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the most accepted tool for represent information in knowledge management application is the ontology. There are many theory describe for ontology development method but in a loosely instruction. This paper contributes the new method to develop ontology by using a structured model of the software requirement engineering process. We demonstrate that requirement engineering process can provide...
It took 10 years for the city of Munich to migrate 15,000 PCs from Windows to the Linux operating system. Was it worth it? This article focuses on how to effectively cope with open source software (OSS) adoption in an organizational context. Based on the Linux in Munich case, the authors present challenges and risks for IT decision makers and propose recommendations for evaluating and calculating...
Production of engineering drawings have evolved from manual to Computer Aided Design (CAD), primarily for the speed and accuracy presented by CAD. Unlike modelling and simulation packages that are equipped with building blocks, CAD packages are generally supplied with no pre-drawn symbols. From best practices in industrial engineering and working for companies that make use of CAD systems, evidently...
Somewhat Homomorphic Encryption (SHE) schemes allow to carry out operations on data in the cipher domain. In a cloud computing scenario, personal information can be processed secretly, inferring a high level of confidentiality. Most practical Somewhat Homomorphic Encryption (SHE) schemes require the implementation of fast polynomial arithmetic, that is why hardware accelerators usually target the...
This paper present a software infrastructure for multiservice access solution based on S-OrBAC model and smartcard that allow benefiting from free or prepaid multiservice offered by big organizations. The authentication of users is made by the security features of the smartcard and the control of rights and attributes by a new variant S-OrBAC model based on the concept of service.
Security is often treated as secondary or a non- functional feature of software which influences the approach of vendors and developers when describing their products often in terms of what it can do (Use Cases) or offer customers. However, tides are beginning to change as more experienced customers are beginning to demand for more secure and reliable software giving priority to confidentiality, integrity...
A search system that allows the users to search and find the most interesting software artifacts based on the current context of the user is highly desirable. This paper sets forth the requirements of contextual search for software engineering. A context for software engineering is defined by four dimensions in. A contextual search system is presented to address the requirements. We conclude that...
In today's dynamic, fast world, many IT organizations are shifting their focus towards global software development to utilize every possible benefit across geography. This provides an opportunity for many practitioners across the globe to undertake an assignment for their betterment. Though, they undertake assignments with confidence, they face multiple challenge in the working environment to gain...
To maintain acceptable levels of security, organizations must manage their IT assets and related vulnerabilities. However, this can be a considerable burden because their resources are often limited. We have been working on a technique and system architecture that monitor the vulnerability of the IT assets on an organization's administrative networks. It uses identifiers of IT assets to locate vulnerability...
Accounting Information System (AIS) is a platform in which the core concepts of accounting, such as, recording, classifying, storing, safeguarding and interpreting data and reporting accounting information are performed by using various standardized and customized software for better financial control. A wide range of accounting software, such as, Tally, Troyee, AccPac, Oracle Applications, SAP, etc...
Data traffic on the Internet is growing continuously due to the high number of connected devices and increased number of applications and transactions performed online. To ensure information security, integrity and confidentiality, cryptography is applied over transmitted or stored data. Hence, even if an attacker capture data packets, its reading is hampered or not even possible. However, an attacker...
Dynamic Instance Queuing (DIQ) is a promising technique to optimize resource management during business process execution. It is domain-independent, does not require any predefined knowledge, and can be applied complementary to other optimization strategies. It represents a compromise between a non-optimized process execution and comprehensive business process redesign approaches which require a lot...
This work investigates how social bots can phish employees of organizations, and thus endanger corporate network security. Current literature mostly focuses on traditional phishing methods (through e-mail, phone calls, and USB sticks). We address the serious organizational threats and security risks caused by phishing through online social media, specifically through Twitter. This paper first provides...
Reputation is the opinion (more technically, a social evaluation) of the public towards a person, a group of people, or an organization. In other words, reputation is the general estimation that the public has for a person or an institution. It is an important factor in many fields, like business, online communities or social status. It is also a subject of study in social, management and technological...
The crucial element of any agile project is people. Not surprisingly, principles and values such as “espect for people”, “Communication and Collaboration”, “Lead using a team approach”, and “Learn and improve continuously” are an integral part of Open Kanban. However, Open Kanban has not provided any tools or techniques to aid the human side of software development. Moreover, as a Lean initiative,...
Managing a software development project is a challenging task; time and effort is required to monitor the project's health and progress. In this context, organizations look for proposals that would assist them in this task. Recently a new and light alternative was introduced: ALPHAs, which are central elements of ESSENCE - Kernel and Language for Software Engineering Methods OMG standard. This paper...
Software architects don't just design architecture components or champion architecture qualities; they often must guide and harmonize the entire community of project stakeholders. The community-shepherding aspects of the architect's role have been gaining attention, given the increasing importance of complex "organizational rewiring" scenarios such as DevOps, open source strategies, transitions...
Global Software Development (GSD) poses inherent risks to projects success. Project managers are now faced with new challenges related to the geographical, temporal and socio-cultural distances between stakeholders. The objective of this research is to identify challenges associated with Software Project Management (SPM) activities in a GSD context and present an integrative framework encompassing...
There is no widely-accepted lexicon or standard set of rules for auditing static analysis alerts in the software engineering community. Auditing rules and a lexicon should guide different auditors to make the same determination for an alert. Standard terms and processes are necessary so that initial determinations are correctly interpreted, which helps organizations reduce code flaws. They are also...
Enterprises today are facing an increasing number of criminal threats ranging from financially motivated and opportunistic malware to more advanced targeted attacks organized by nation-state actors. To protect against these threats, enterprises deploy a number of perimeter defenses, including traditional controls (antivirus software, intrusion detection systems, firewalls) and more advanced techniques...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.