Secured Requirement Specification Framework (SRSF)

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Empirical Validation of Reliable Requirement Specification Framework

In the view of changing technologies in requirement engineering the RRS framework is being introduced [1] for early stage requirement defect identification [2] and mitigation [3] during software development process to make requirement specification reliable. With the use of RRS framework at early stage of SDLC, requirement defect identification and their proper mitigation has become cheaper tha...

متن کامل

Assisting Temporal Requirement Specification

The aim of the present work is to introduce a pattern-based method for assisting the user during the temporal Requirement Specification (RS) phase. Indeed, since the user usually has to handle abstract notation as well as mathematical-based languages within this phase, RS is becoming more and more tedious and error-prone especially when dealing with complex systems. The authors’ method begins b...

متن کامل

Secured Cloud Support for Global Software Requirement Risk Management

This paper presents core problem solution to security of Global Software Development Requirement Information. Currently the major issue deals with hacking of sensitive client information which may lead to major financial as well as social loss. To avoid this system provides cloud security by encryption of data as well as deployment of tool over the cloud will provide significant security to who...

متن کامل

Secured Framework for Pervasive Healthcare Monitoring Systems

‘Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing applications aimed at providing healthcare services to all the people through mobile communication devices. Pervasive computing devices are resource constrained devices such as battery power, memory, processing power and bandwidth. In pervasive environment data privacy is a key issue. In this application...

متن کامل

Fusion Framework for Robust and Secured Watermarking

This paper presents a robust and secure watermarking technique for digital image. To implement the technique, Discrete Wavelet Transform (DWT) is applied on cover image. Further on Low-Low (LL) sub-band of DWT, Discrete Cosine Transform (DCT) is applied which is followed by Singular Value Decomposition (SVD). To introduce the secure watermarking, watermark is secured using Arnold Transformation...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: American Journal of Applied Sciences

سال: 2008

ISSN: 1546-9239

DOI: 10.3844/ajassp.2008.1622.1629