oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Overview of COTS Software Component Evaluation
COTS软构件评估研究综述*

YUAN Xin-wei,QIN Zheng,
原欣伟
,覃正

计算机应用研究 , 2006,
Abstract: An overview of COTS software component evaluation is presented, including the position in the whole CBS activity framework, concrete processes and methods, correlative other CBS activities. In the end, the trend of COTS software component evaluation is introduced.
The Fuzzy Integrated Assessment of Information Security from Qualitative to Quantitative
从定性到定量的信息安全模糊综合评估

SUN Wei-hong,HE De-quan,
孙卫红
,何德全

系统工程理论与实践 , 2006,
Abstract: Using metasynthesis method,to estimate the information security of E-government,this article proposes a new method of fuzzy integrated assessment which is based on data collection through man-computer combined.And a new concept of "degree of assurance" is also presented.With this method,man-computer combined data collection provide impersonal and scientific base to evaluate fuzzy matrix in the Delphi method.It reduces the subjectivity of expert assessment,alleviates the difficulty of data collection and makes possible a better combination of qualitative and quantitative assessments.It is an integrated,rational,and scientific metasynthesis method from qualitative to quantitative.At the end of this paper,an example is shown.
A Theoretical and Empirical Evaluation of Software Component Search Engines, Semantic Search Engines and Google Search Engine in the Context of COTS-Based Development  [PDF]
Nacim Yanes,Sihem Ben Sassi,Henda Hajjami Ben Ghezala
Computer Science , 2012,
Abstract: COTS-based development is a component reuse approach promising to reduce costs and risks, and ensure higher quality. The growing availability of COTS components on the Web has concretized the possibility of achieving these objectives. In this multitude, a recurrent problem is the identification of the COTS components that best satisfy the user requirements. Finding an adequate COTS component implies searching among heterogeneous descriptions of the components within a broad search space. Thus, the use of search engines is required to make more efficient the COTS components identification. In this paper, we investigate, theoretically and empirically, the COTS component search performance of eight software component search engines, nine semantic search engines and a conventional search engine (Google). Our empirical evaluation is conducted with respect to precision and normalized recall. We defined ten queries for the assessed search engines. These queries were carefully selected to evaluate the capability of each search engine for handling COTS component identification.
Risk Assessment Techniques and Survey Method for COTS Components  [PDF]
Rashmi Gupta,Shalini Raghav
Computer Science , 2012,
Abstract: The Rational Unified Process a software engineering process is gaining popularity nowadays. RUP delivers best software practices for component software Development life cycle It supports component based software development. Risk is involved in every component development phase .neglecting those risks sometimes hampers the software growth and leads to negative outcome. In Order to provide appropriate security and protection levels, identifying various risks is very vital. Therefore Risk identification plays a very crucial role in the component based software development This report addresses incorporation of component based software development cycle into RUP phases, assess several category of risk encountered in the component based software. It also entails a survey method to identify the risk factor and evaluating the overall severity of the component software development in terms of the risk. Formula for determining risk prevention cost and finding the risk probability is also been included. The overall goal of the paper is to provide a theoretical foundation that facilitates a good understanding of risk in relation to componentbased system development
Risk Assessment Techniques and Survey Method for COTS Components  [PDF]
Rashmi Gupta,Shalini Raghav
International Journal of Software Engineering & Applications , 2012,
Abstract: The Rational Unified Process a software engineering process is gaining popularity nowadays. RUPdelivers best software practices for component software Development lifecycle It supports componentbasedsoftware development. Risk is involved in every component development phase .neglecting those riskssometimes hampers the software growth and leads to negative outcome. In Order to provide appropriatesecurity and protection levels, identifying various risks is very vital. Therefore Risk identification plays avery crucial role in the component based software development This report addresses incorporation ofcomponent based software development cycle into RUP phases ,assess several category of risk encounteredin the component based software. It also entails a survey method to identify the risk factor and evaluatingthe overall severity of the component software development in terms of the risk. Formula for determiningrisk prevention cost and finding the risk probability is also been included. The overall goal of the paper isto provide a theoretical foundation that facilitates a good understanding of risk in relation to componentbasedsystem development.
Method of COTS Component Integration Test Case Generation Based on the Run-time Interaction Constraints
一种基于运行时交互约束的COTS构件集成测试用例生成方法

GAO Jing,LAN Yu-qing,JIN Mao-zhong,
高静
,兰雨晴,金茂忠

计算机科学 , 2009,
Abstract: Source code of COTS (Commercial Off-The-Shelf) component is not available and specification is usually lack of interaction semantic information.It makes the software system,which integrates COTS components,unable to use the method of integration test case generation which is based on the source code and specification.A method of COTS components integration test case generation based on the run-time interaction constraints was proposed.During the execution process of preliminary functional test cases for the...
Proposed Framework for Security Risk Assessment  [PDF]
Zakaria I. Saleh, Heba Refai, Ahmad Mashhour
Journal of Information Security (JIS) , 2011, DOI: 10.4236/jis.2011.22008
Abstract: Security risk assessment framework provides comprehensive structure for security risk analysis that would help uncover systems’ threats and vulnerabilities. While security risk assessment is an important step in the security risk management process, this paper will focus only on the security risk assessment framework. Viewing issues that exist in a current framework, we have developed a new framework for security risk and vulnerabilities assessment by adding new components to the processes of the existing framework. The proposed framework will further enhance the outcome of the risk assessment, and improve the effectiveness of the current framework. To demonstrate the efficiency the proposed framework, a network security simulation as well as filed tests of an existing network where conducted.
Component-based Software Design and Implementation for Network Security System  [PDF]
Jianchao Han,Mohsen Beheshti,Kazimierz Kowalski,Johnly Tomelden
International Journal of Software Engineering , 2009,
Abstract: A computer network intrusion detection and prevention system consists of collectingnetwork traffic data, discovering user behavior patterns as intrusion detectionrules, and applying these rules to prevent malicious and misuse. Manycommercial off-the-shelf (COTS) products have been developed to performeach of these tasks. In this paper, the component-based software engineeringapproach is exploited to integrate these COTS products as componentsinto a computerized system to automatically detect intrusion rules from networktraffic data and setup IPTables to prevent future potential attacks. The component-based software architecture of this kind of system is designed, COTScomponents are analyzed and selected, adaptor components to connect COTSproducts are developed, the system implementation is illustrated, and the preliminarysystem experiment is presented.
COTS-Components Based System Development
基于COTS构件的系统开发

张世琨,王立福
计算机科学 , 2000,
Abstract: With the process of software component technology, a new trend emerges with a large amount of COTS products used in software systems. and software systems exhibit the characteristics of constructibility and evolvpbility. In this paper. we introduce the system development process based on COTS components, analyze the short-term and long-term factors concerned in COTS-based system development. Some relevant technologies are outlined.
HOW TO CALCULATE INFORMATION VALUE FOR EFFECTIVE SECURITY RISK ASSESSMENT
Mario Sajko,Kornelije Rabuzin,Miroslav Ba?a
Journal of Information and Organizational Sciences , 2006,
Abstract: The actual problem of information security (infosec) risk assessment is determining the value of information property or asset. This is particularly manifested through the use of quantitative methodology in which it is necessary to state the information value in quantitative sizes. The aim of this paper is to describe the evaluation possibilities of business information values, and the criteria needed for determining importance of information. For this purpose, the dimensions of information values will be determined and the ways used to present the importance of information contents will be studied. There are two basic approaches that can be used in evaluation: qualitative and quantitative. Often they are combined to determine forms of information content. The proposed criterion is the three-dimension model, which combines the existing experiences (i.e. possible solutions for information value assessment) with our own criteria. An attempt for structuring information value in a business environment will be made as well.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.