Secured Requirement Specification Framework (SRSF)
نویسندگان
چکیده
منابع مشابه
Empirical Validation of Reliable Requirement Specification Framework
In the view of changing technologies in requirement engineering the RRS framework is being introduced [1] for early stage requirement defect identification [2] and mitigation [3] during software development process to make requirement specification reliable. With the use of RRS framework at early stage of SDLC, requirement defect identification and their proper mitigation has become cheaper tha...
متن کاملAssisting Temporal Requirement Specification
The aim of the present work is to introduce a pattern-based method for assisting the user during the temporal Requirement Specification (RS) phase. Indeed, since the user usually has to handle abstract notation as well as mathematical-based languages within this phase, RS is becoming more and more tedious and error-prone especially when dealing with complex systems. The authors’ method begins b...
متن کاملSecured Cloud Support for Global Software Requirement Risk Management
This paper presents core problem solution to security of Global Software Development Requirement Information. Currently the major issue deals with hacking of sensitive client information which may lead to major financial as well as social loss. To avoid this system provides cloud security by encryption of data as well as deployment of tool over the cloud will provide significant security to who...
متن کاملSecured Framework for Pervasive Healthcare Monitoring Systems
‘Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing applications aimed at providing healthcare services to all the people through mobile communication devices. Pervasive computing devices are resource constrained devices such as battery power, memory, processing power and bandwidth. In pervasive environment data privacy is a key issue. In this application...
متن کاملFusion Framework for Robust and Secured Watermarking
This paper presents a robust and secure watermarking technique for digital image. To implement the technique, Discrete Wavelet Transform (DWT) is applied on cover image. Further on Low-Low (LL) sub-band of DWT, Discrete Cosine Transform (DCT) is applied which is followed by Singular Value Decomposition (SVD). To introduce the secure watermarking, watermark is secured using Arnold Transformation...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: American Journal of Applied Sciences
سال: 2008
ISSN: 1546-9239
DOI: 10.3844/ajassp.2008.1622.1629