The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The globalization of the software industry has introduced a widespread use of system components across traditional system boundaries. Due to this global reuse, also vulnerabilities and security concerns are no longer limited in their scope to individual systems but instead can now affect global software ecosystems. While known vulnerabilities and security concerns are reported in specialized vulnerability...
In this paper the analysis of the known approaches to detection of emergent properties of software system in the context of involvement for this of the software quality models was done. The attempt of evaluation of share of the non-functional requirements in the software quality models was done.
Requirements engineering (RE) in software development life cycle is considered as a main pillar of success of a software system. RE process is used to find out the key requirements in order to develop a system as per needs of the stakeholders. The two focal points in RE process are stakeholders and requirements. Systematic literature review (SLR) is the mean of collecting evidence-based data about...
Modern society depends on the continuing correct operation of software-based systems. Critical infrastructures — including energy, communication, transportation, and finance — all function within powerful and complex computing environments. The dependability of these systems is increasingly threatened by a wide range of adversaries, and increasing investments are being made to provide and assess sufficient...
Given the ongoing trend towards the globalization of software systems, open networks, and distributed platforms, validating non-functional requirements and quality becomes essential. Our research addresses this challenge from two different perspectives: (1) the integration of knowledge and tool resources through Semantic Web technologies as part of our SE-PAD environment, in order to reduce or eliminate...
Software Assurance is a subject that has differing definitions depending upon who is providing them. An examination of the literature, including end user materials has produced a series of definitions. The disconnect between these definitions provides for miscommunication and disagreement about paths and options during the software development progress. This research project set out to discover the...
In the process of software production, testing is the premise to guarantee the quality of software. With the extensive application of network software, Web security test has become a key point that can not neglect. Based on the Analytic Hierarchy Process (AHP) algorithm, a new kind of Web security testing programme was introduced in this paper. According to which it realized the Web Security auto-Testing...
Service composition is an effective way to achieve value-added service, which has found wide application in various areas. security design at architecture level is critical to achieve high assurance for these applications. However, most security design techniques for service composition were in ad hoc fashion and fell short in precise notations. This paper proposes a formal aspect-oriented approach...
With the service-oriented paradigm, some established ways of thinking about software quality and its assurance seem to change. But things do not necessarily become more difficult. Some considerable advancements to traditional ways of quality management can be introduced through the use of service-based systems, leading to largely reduced efforts and increased quality. In this article we identify the...
Accurate measurement is a foundation upon which accurate controlling for things rests. Based on the real-time monitoring of the statuses and behaviors of running software, we check whether they work normally or not, and then guide the abnormal operating conditions or behaviors onto the way in control to make sure the software service ability unchangeable. In certain circumstances, degraded running...
Selecting the right software is of crucial importance for businesses. Free/Libre Open Source Software (FLOSS) quality models can ease this decision-making. This paper introduces a distinction between first and second generation quality models. The former are based on relatively few metrics, require deep insights into the assessed software, relying strongly on subjective human perception and manual...
Rich Internet Applications (RIA) involve complex architectural design decisions, which greatly affect the quality of the final application. Unfortunately, quality requirements tend to be ignored during the architectural design process. This article reports a quality-driven approach for the systematic construction of RIA architectures. Our approach integrates model-driven development and software product...
We are surrounded by ever more systems with high dependability requirements, such as driving assistance systems from the automotive domain or life-supporting systems from the medical domain. The increasing complexity of these systems makes it more difficult not only to develop them, but also to perform quality assurance on them. Hence, in order to improve their quality, respectively reduce the potential...
This paper discusses different aspects of performing monitoring in the context of software intensive systems. The focus is especially on cases where the observed system is distributed, and the monitoring system needs to be secure, dependable and capable to adapt to a number of dynamic scenarios during the system evolution. Based on analysis of monitoring needs in this type of a domain, a set of core...
Security in code level is an important aspect to achieve high quality software. Various security programming guidelines are defined to improve the quality of software code. At the same time, enforcing mechanisms of these guidelines are needed. In this paper, we use source code model checking technique to check whether some security programming guidelines are followed, and correspondingly to detect...
This paper describes how the author integrates work culture issues into his undergraduate course in Software Engineering. This is a required course for all Computer Science majors in our program. At issue is how work culture impacts upon the quality of the products being created by Software Engineers. The course addresses work culture concerns such as: What kinds of work culture issues arise during...
The first method developed to translate customer requirements into software specification was the Quality Function deployment (QFD) and the second approach to the identification of software specification comes from the software engineering. Requirements may be defined as a demand or need. In software engineering, a requirement is a description of what a system should do. System may have dozen to thousands...
The new generation of open networked IT systems poses particular challenges to software engineering due to their evolving nature and their high quality requirements. In particular, the management of service oriented systems requires the integration of perspectives from IT management, software engineering and systems operation and a systematic way to handle changes. In this paper we will present the...
Design-level vulnerabilities are a main source of security risks in software. To improve the reliability of software design, this paper presents a modified threat-driven modeling framework, to determine which threats require mitigation and how to mitigate the threats. To specify the functions and threat mitigations of a security design as a whole, aspect-oriented Stochastic Petri nets are used as...
This paper discusses adding a new logic processing module which is in line with the WOSA/XFS standard to the existing self-service terminal. In this module, the mapping relationship of the SP (service provider) and service call function have been realized because the use of reflection mechanisms, thereby ensuring that the application function has nothing to do with the hardware devices. All that have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.