نتایج جستجو برای: forward traceability attack

تعداد نتایج: 203777  

Journal: :Journal of Systems and Software 2009
Patricia Lago Henry Muccini Hans van Vliet

Traceability is the ability to describe and follow the life of a software artifact and a means for modeling the relations between software artifacts in an explicit way. Traceability has been successfully applied in many software engineering communities and has recently been adopted to document the transition among requirements, architecture and implementation. We present an approach to customiz...

Journal: :Journal of Systems and Software 2004
George Spanoudakis Andrea Zisman Elena Pérez-Miñana Paul Krause

The support for traceability between requirement specifications has been recognised as an important task in the development life-cycle of software systems. In this paper, we present a rule-based approach to support the automatic generation of traceability relations between documents which specify requirement statements and use cases (expressed in structured forms of natural language), and analy...

Journal: :IJSDS 2014
Usman K. Durrani Zijad Pita Joan Richardson John Lenarcic

The purpose of traceability is to ensure persistent alignment of product knowledge between stakeholders, artifacts, and traceability objects. On the other hand, process knowledge is equally important to ensure a systematic software development process with accurate specification and verifiable quality attributes. Previous studies lacks in presenting a consolidated view from product and process ...

2016
Madan Mohan Malaviya

Wireless sensor networks passes a practical and Economically feasible alternative to manual data association in general and military scenarios, providing a means of surveillance of a region of field and providing warning of any threats. In common wormhole attack, the attacker receives packets in the network, forward them through a wired or wireless association with high-bandwidth low-latency bo...

Journal: :JCP 2013
Fenghua Liu

Two-factor authentication using password and smart card could reduce the risk than the use of a password alone. Recently, Chen et al. proposed a two-factor remote user authentication protocol using password and smart card and provide the criteria of authentication protocols. They claimed their protocol is secure against certain known attacks. In this paper, the authors showed that Chen et al.’s...

2002
Jonathan Katz Rafail Ostrovsky Moti Yung

Password-only authenticated key exchange (PAKE) protocols are designed to be secure even when users choose short, easilyguessed passwords. Security requires, in particular, that the protocol cannot be broken by an o -line dictionary attack in which an adversary enumerates all possible passwords in an attempt to determine the correct one based on previously-viewed transcripts. Recently, provably...

2009
Derrick Yeo Joshua Henderson Ella Atkins

Small fixed-wing UAS that are able to hover combine the station keeping abilities of a rotary wing platform and the extended range of conventional aircraft. Current autopilots for these vehicles rely on inertial measurements plus airspeed to transition from forward flight to hover, accumulating appreciable position error during the transition. Once in hover, a combination of inertial and GPS da...

Journal: :Computer Communications 2011
Dang Nguyen Duc Kwangjo Kim

In this paper, we present a security weakness of a forward secure authentication protocol proposed by Tri Van Le et al. called O-FRAP which stands for Optimistic Forward secure RFID Authentication Protocol. In particular, we point out that in the O-FRAP protocol, the server can be subject to a denial-of-service attack due to a flaw in the database querying procedure. Our attack also applies to ...

2001
philip. bulman

WANTED: MEASUREMENTS WITH GOOD REFERENCES In nearly all types of activities-be they related to manufacturing, finance, health, regulatory affairs or even sports-people and organizations are becoming sticklers for measurement uncertainty. NIST, the nation’s measurement authority, has responded to this growing customer need for demonstrable uncertainty. It has created an on-line resource— www.nis...

2013
Elke Bouillon Patrick Mäder Ilka Philippow

[Context and motivation] Requirements traceability is known as an important part of development projects. Studies showed that traceability is applied in practice, but insufficient tooland method-support hinders its practical use. [Question/problem] We conducted a survey to understand which traceability usage scenarios are most relevant for practitioners. Gaining this information is a required s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید