131,837 research outputs found

    A secured e-tendering model based on rational unified process (RUP) approach: inception and elaboration phases

    Get PDF
    Due to the rapid rise in the e-Tendering transaction over the internet and the increasing use of e-Tendering solution by large organizations, there is a need to construct a secured e-Tendering model to ensure some security mechanisms such as confidentiality, integrity, and accessibility of the document are embedded in the e-tendering model.This to ensure the e-tendering transaction is secured and the most important is to gain trust from the e-Tendering stakeholder. Therefore, there is a need to develop a secured e-Tendering model as a guideline to e-tendering developers in developing the system. The Rational Unified Process (RUP) is the most appropriate system development methodology that can guide researchers in generating secured artifact. The RUP has been used by many researchers to construct a secured application model in various researches and projects. This due to the ability of the RUP in guiding researchers to deliver secured artifacts through Inception and elaboration phases.Therefore, this study aims to construct a secured e-tendering artifacts based on RUP. The Unified Modeling Language (UML) is used to generate the secured e-tendering artifacts. This paper discusses the generation of use case, misuse case and class diagrams based on security mechanism that need to be embedded in the e-Tendering model.This study also found that, the RUP is one of the best system development methodology that can be used as one of the research methodology in the Software Engineering domain, especially related to secured design of any observed application.This methodology has been tested in various studies, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth.This study may contribute to the software industries in developing a secured system application in the future, and also to the secured system modeling domain

    Proposing a secure component-based-application logic and system’s integration testing approach

    Get PDF
    Software engineering moved from traditional methods of software enterprise applications to com-ponent based development for distributed system’s applications. This new era has grown up forlast few years, with component-based methods, for design and rapid development of systems, butfact is that , deployment of all secure software features of technology into practical e-commercedistributed systems are higher rated target for intruders. Although most of research has been con-ducted on web application services that use a large share of the present software, but on the otherside Component Based Software in the middle tier ,which rapidly develops application logic, alsoopen security breaching opportunities .This research paper focus on a burning issue for researchersand scientists ,a weakest link in component based distributed system, logical attacks, that cannotbe detected with any intrusion detection system within the middle tier e-commerce distributed ap-plications. We proposed An Approach of Secure Designing application logic for distributed system,while dealing with logically vulnerability issue

    Towards a Security Engineering Process Model for Electronic Business Processes

    Full text link
    Business process management (BPM) and accompanying systems aim at enabling enterprises to become adaptive. In spite of the dependency of enterprises on secure business processes, BPM languages and techniques provide only little support for security. Several complementary approaches have been proposed for security in the domain of BPM. Nevertheless, support for a systematic procedure for the development of secure electronic business processes is still missing. In this paper, we pinpoint the need for a security engineering process model in the domain of BPM and identify key requirements for such process model.Comment: Ninth European Dependable Computing Conference (EDCC 2012

    Business integration models in the context of web services.

    Get PDF
    E-commerce development and applications have been bringing the Internet to business and marketing and reforming our current business styles and processes. The rapid development of the Web, in particular, the introduction of the semantic web and web service technologies, enables business processes, modeling and management to enter an entirely new stage. Traditional web based business data and transactions can now be analyzed, extracted and modeled to discover new business rules and to form new business strategies, let alone mining the business data in order to classify customers or products. In this paper, we investigate and analyze the business integration models in the context of web services using a micro-payment system because a micro-payment system is considered to be a service intensive activity, where many payment tasks involve different forms of services, such as payment method selection for buyers, security support software, product price comparison, etc. We will use the micro-payment case to discuss and illustrate how the web services approaches support and transform the business process and integration model.

    Quality measures for ETL processes: from goals to implementation

    Get PDF
    Extraction transformation loading (ETL) processes play an increasingly important role for the support of modern business operations. These business processes are centred around artifacts with high variability and diverse lifecycles, which correspond to key business entities. The apparent complexity of these activities has been examined through the prism of business process management, mainly focusing on functional requirements and performance optimization. However, the quality dimension has not yet been thoroughly investigated, and there is a need for a more human-centric approach to bring them closer to business-users requirements. In this paper, we take a first step towards this direction by defining a sound model for ETL process quality characteristics and quantitative measures for each characteristic, based on existing literature. Our model shows dependencies among quality characteristics and can provide the basis for subsequent analysis using goal modeling techniques. We showcase the use of goal modeling for ETL process design through a use case, where we employ the use of a goal model that includes quantitative components (i.e., indicators) for evaluation and analysis of alternative design decisions.Peer ReviewedPostprint (author's final draft

    Software Engineering Timeline: major areas of interest and multidisciplinary trends

    Get PDF
    Ingeniería del software. EvolucionSociety today cannot run without software and by extension, without Software Engineering. Since this discipline emerged in 1968, practitioners have learned valuable lessons that have contributed to current practices. Some have become outdated but many are still relevant and widely used. From the personal and incomplete perspective of the authors, this paper not only reviews the major milestones and areas of interest in the Software Engineering timeline helping software engineers to appreciate the state of things, but also tries to give some insights into the trends that this complex engineering will see in the near future
    corecore