273,977 research outputs found

    Rdesign: A data dictionary with relational database design capabilities in Ada

    Get PDF
    Data Dictionary is defined to be the set of all data attributes, which describe data objects in terms of their intrinsic attributes, such as name, type, size, format and definition. It is recognized as the data base for the Information Resource Management, to facilitate understanding and communication about the relationship between systems applications and systems data usage and to help assist in achieving data independence by permitting systems applications to access data knowledge of the location or storage characteristics of the data in the system. A research and development effort to use Ada has produced a data dictionary with data base design capabilities. This project supports data specification and analysis and offers a choice of the relational, network, and hierarchical model for logical data based design. It provides a highly integrated set of analysis and design transformation tools which range from templates for data element definition, spreadsheet for defining functional dependencies, normalization, to logical design generator

    SISTEM PENGOLAHAN TRANSAKSI PADA PT. SABA INDOMEDIKA JAYA PALEMBANG

    Get PDF
    The research objective was to design a transaction processing system that uses a data base so as to facilitate, accelerate and reduce the level of error in the processing of sales data. The research method used by writer is method consists of iterations of the system survey and design stage. Phase system survey conducted by surveying the system running, conducting interviews and collecting data to obtain the needed information, conduct and analyze the scope of the problems with using the PIECES. In the design phase is done by creating a logical system design and physical systems, program design and determine the schedule of implementation of the system. The results of the survey system and transaction processing system design is expected to be forwarded to the implementation phase so that the system can be applied for purposes of sale of PT. Saba Indomedika Jaya Palembang. With the existence of this system is expected to address the problems that exist in the processing of sales data and speed up the search data items needed to improve the services provided by PT. Saba Indomedika Jaya Palembang to its employees

    Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study

    Full text link
    Security risk management can be applied on well-defined or existing systems; in this case, the objective is to identify existing vulnerabilities, assess the risks and provide for the adequate countermeasures. Security risk management can also be applied very early in the system's development life-cycle, when its architecture is still poorly defined; in this case, the objective is to positively influence the design work so as to produce a secure architecture from the start. The latter work is made difficult by the uncertainties on the architecture and the multiple round-trips required to keep the risk assessment study and the system architecture aligned. This is particularly true for very large projects running over many years. This paper addresses the issues raised by those risk assessment studies performed early in the system's development life-cycle. Based on industrial experience, it asserts that attack trees can help solve the human cognitive scalability issue related to securing those large, continuously-changing system-designs. However, big attack trees are difficult to build, and even more difficult to maintain. This paper therefore proposes a systematic approach to automate the construction and maintenance of such big attack trees, based on the system's operational and logical architectures, the system's traditional risk assessment study and a security knowledge database.Comment: In Proceedings GraMSec 2014, arXiv:1404.163
    corecore