نتایج جستجو برای: traceability attack
تعداد نتایج: 86939 فیلتر نتایج به سال:
Traceability relations are used to understand the dependencies between the artifacts created during the development of a software system. In model driven Engineering (MDE), traceability relations may be generated implicitly or explicitly. When changes occur to the models, it is necessary that the traceability links must be maintained and must be evolved. The purpose of this paper is to propose ...
The software maintenance process relies on traceability information captured throughout the development of a software product. Traceability from code to software engineering artifacts like features or requirements has been extensively researched. In this paper, we focus on traceability links between code and tasks. Tasks can be further linked to other artifacts such as features or requirements....
Traceability is a tool to help countries meet their objectives of controlling, preventing and eradicating animal diseases. This article sets out the required steps in a traceability system. Before designing a system of traceability, one must identify the different characteristics that need to be traced throughout the various steps in the food production chain. The interaction between different ...
Dealing with traceability management issues during model based product derivation in large complex industrial SPL is error prone due to the lack of tool support. As a result traceability management between connected models emerges as an important research topic. In this position paper, we discuss research challenges as scenarios from developed example product line and give recommendations on re...
Aiming at the problem of illegal data sharing malicious users in access control scheme based on attribute-based encryption, an that can restrict sending ability owners is proposed. By adding a sanitizer to sanitize ciphertext, it ensure parties who do not adhere system policy cannot share information effectively. The constructed blockchain, and traceability process be realized. Off-chain storag...
recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...
Softwaresysteme spielen in vielen Lebensbereichen eine immer wichtigere Rolle und werden immer komplexer. Sie unterliegen häufigen Änderungen, die notwendig sind, um weiteren Einsatz zu ermöglichen. Solche Änderungen erfordern hohen Aufwand und sind außerdem mit hohen Risiken verbunden, z.B. bezüglich Korrektheit, Terminund Budgeteinhaltung. Häufige Änderungen führen zu Strukturverlust (englisc...
Traceability is the ability to describe and follow the life of a software artifact and a means for modeling the relations between software artifacts in an explicit way. Traceability has been successfully applied in many software engineering communities and has recently been adopted to document the transition among requirements, architecture and implementation. We present an approach to customiz...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید