نتایج جستجو برای: traceability attack
تعداد نتایج: 86939 فیلتر نتایج به سال:
Abstract In this paper, a secure content distribution scheme is proposed which transmits the multimedia content to users in a secure manner. In server side, the content is embedded by pseudorandom sequences (the customer’s ID) and then encrypted by another pseudorandom sequence. In user side, the content is decrypted with the some sequence as the encryption process. All the pseudorandom sequenc...
Improving food safety, reducing the impacts of food safety problems, and providing a means to verify food quality attributes are driving the development of traceability initiatives in agri-food systems. Numerous and varied examples exist, from regulatory traceability initiatives, to industry-wide livestock traceability programmes, to individual supply-chain systems that combine traceability wit...
Software traceability is the ability to relate artefacts created during the life cycle of software development. Traceability is fundamental to support several activities of the software development process such as impact analysis, software maintenance and evolution, verification and validation. Despite the importance and advances in the software traceability area, traceability practice is still...
In this paper we present a machine learning approach for generating requirements traceability relations. This approach is based on a new learning algorithm that produces traceability rules which are able to capture traceability relations between requirement statements specified in natural language and object models. The creation of these traceability rules is informed by examples of traceabilit...
This glossary entry explores traceability which is an increasingly prominent research topic in decentralised technosocial systems fields as diverse health, sustainability, finance, and supply chain management relates to the ability trace something or someone.
Radio frequency identification systems need secure protocols to provide confidentiality, privacy protection, mutual authentication, etc. These protocols should resist active and passive attacks such as forgery, traceability, replay and de-synchronization attacks. Cho et al. recently proposed a hash-basedmutual authentication protocol (Cho et al., 2012) and claimed that their scheme addresses al...
In MDE diverse modeling and model transformation languages are applied to describe and derive the envisioned system. Traceability is a prerequisite for maintaining consistency between different development artifacts. Thereby, the usefulness of traceability links increases with their completeness and correctness. In practice, automatic creation and maintenance of traceability links is required t...
In recent years, traceability systems have been developed as effective tools for improving the transparency of supply chains, thereby guaranteeing the quality and safety of food products. In this study, we proposed a cattle/beef supply chain traceability model and a traceability system based on radio frequency identification (RFID) technology and the EPCglobal network. First of all, the transfo...
Traceability of requirements through the software development lifecycle (including supporting processes such as risk management and change management) is a difficult and expensive task. The implementation of effective traceability allows organizations to leverage its many advantages, such as impact analysis, product verification and validation, and facilitation of code maintenance. Traceability...
Traceability data provides the knowledge on dependencies and logical relations existing amongst artefacts that are created during software development. In reasoning over traceability data, conclusions can be drawn to increase the quality of software. The paradigm of Model-driven Software Engineering (MDSD) promotes the generation of software out of models. The latter are specified through diffe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید