نتایج جستجو برای: forward traceability attack

تعداد نتایج: 203777  

2006
Jane Cleland-Huang

Even though traceability is legally required in most safety critical software applications and is a recognized component of many software process improvement initiatives, organizations continue to struggle to implement it in a cost-effective manner. This panel addresses the problems and challenges of requirements traceability and asks questions such as “How much traceability is enough?” and “Wh...

2003
Gilberto A. A. Cysneiros Filho Andrea Zisman George Spanoudakis

In this paper we propose an approach that can be used to generate traceability relations between organisational models specified in i* and software systems models represented in UML (in particular use case and class diagrams). Our approach proposes different types of traceability relationships between i* and UML models and uses traceability rules to generate the different types of traceability ...

Journal: :IEEE Access 2021

In the last decades, several signcryption schemes have been developed for different privacy-enhancing purposes. this paper, we propose a new group scheme that provides: unforgeability, confidentiality, ciphertext and sender anonymity, traceability, unlinkability, exculpability, coalition-resistance, unforgeable tracing verification. It is important to notice proposed allows signer anonymously s...

Journal: :مدیریت زنجیره تأمین 0
علی عباسی رائی همت مراد قلندری عیسی نخعی کمال آبادی

traceability is an ability of system to provide status reports or records pertaining of the current situation in the past. in production systems, traceability to track the product or lot of a product and access to records in the entire production process (or part of the process) of the raw material to finished product that purchased and consumed by customer will be applied. traceability in prod...

2008
Hsin-yi Jiang Tien N. Nguyen Ing-Xiang Chen

Maintaining traceability links among software artifacts is particularly important for many software engineering tasks. Even though automatic traceability link recovery tools are successful in identifying the semantic connections among software artifacts produced during software development, no existing traceability link management approach can effectively and automatically deal with software ev...

Journal: :J. Inf. Sci. Eng. 2015
Kuo-Yang Wu Kuo-Yu Tsai Tzong-Chen Wu Kouichi Sakurai

This paper presents an anonymous authentication scheme for roaming service in global mobility networks, in which the foreign agent cannot obtain the identity information of the mobile user who is sending the roaming request. In addition, the home agent does not have to maintain any verification table for authenticating the mobile user. We give formal analyses to show that our proposed scheme sa...

2017
Lijing Zhu Riccardo Manzini

Food waste stemmed from food contamination and ineffective quality control is a significant challenge to food management. Supply chain traceability has become an essential task of the food industry for guaranteeing food quality and safety and reducing food waste. Radio Frequency Identification (RFID) has emerged as a lead technology in the development of traceability systems, which enable autom...

Journal: :Revue scientifique et technique 2005
R Loftus

Traceability is increasingly becoming standard across the agri-food industry, largely driven by recent food crises and the consequent demands for transparency within the food chain. This is leading to the development of a range of traceability concepts and technologies adapted to different industry needs. Experience with genetically modified plants has shown that traceability can play a role in...

2009
Siti Rochimah Wan Kadir Abdul H. Abdullah

Software evolution is inevitable. When a system evolves, there are certain relationships among software artifacts that must be maintained. Requirement traceability is one of importance factor in facilitating software evolution since it maintains the artifacts relationship before and after a change is performed. Requirements traceability can be expensive activities. Many researchers have address...

2014
Karel Durkota Viliam Lisý

An attack graph represents all known sequences of actions that compromise a system in form of an and-or graph. We assume that each action in the attack graph has a specified cost and probability of success and propose an algorithm for computing an action selection policy minimizing the expected cost of performing an attack. We model the problem as a finite horizon MDP and use forward search wit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید