SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May – Jun. 2015), PP 56-60
www.iosrjournals.org
DOI: 10.9790/0661-17325660 www.iosrjournals.org 56 | Page
Abstraction and Automation: A Software Design Approach for
Developing Secure Data Management Application.
C. Bharathipriya
Gkm College Of Engineering And Technology, Chennai
Abstract: Security plays a vital role in data management application. For this purpose while developing, three
different views of applications are modeled namely conceptual, security and GUI model. It formalizes the
objects of problem, applications security and Graphical user interface respectively. A model transformation
process occurs, which shifts policy specified in security to GUI model. To ensure model’s correctness validation
process is carried out and as a final step, a code generator will generate a multi-tier application along with
access control support. The applications are built using our related tool.
Index terms: conceptual model, validation, model driven security, authorization constraints
I. Introduction
Building up of models is the heart of design system. In many engineering disciplines it is off course a
true fact and it is specially increasing in the case of Software Engineering. Model driven engineering which is a
software development methodology aims to build models of different system from which artifacts such as code
gets automatically generated. The abstraction and automation approach is one such model driven development
approach that shifts software development from code to modeling. The model driven approach can deliver its
full potential: that mean, it’s capable of producing secure Graphical user interface for data management
application. In particular the data management applications focus on CRUD action: that is CREATE, READ,
UPDATE and DELETE ACTIONS. All applications contain these operations as their building blocks. For
example dynamic website users used to create their own account, read information from it, update information,
store and also delete the information and data. In such cases the data’s of the users has to be secured against
unauthorized access. For restricting unauthorized access, providing access control policies is standard approach.
But if the access control policies are simple, it may be possible to formalize. In such cases protecting data’s is a
difficult task. In multi-tier system, usually Role based access control is built on application server. In contrast
fine grained access control policies depends on two facts namely user credentials and satisfaction of certain
constraints on persistence layers state. In these cases mentioned above, the authorization checks are encoded in
appropriate places programmatically. But the true fact is these programmatic addition leads to some error,
inflexibility and poor scale in performance. Moreover auditing and maintaining is difficult in these cases. This is
because the authorization checks are spread throughout the code. And change in security policy requires code
changes.
To overcome these, we propose an approach for model driven development in order to develop secure data
management application. . Using our methodology a secure application is modeled using three communicable
models namely:
1. A conceptual model defines the activities of conceptual design like finding classes, specifying attributes,
operations.
2. A security model defines applications security. It provides an authorized access to data’s on conceptual
model.
3. Thirdly a graphical user interface model specifies applications GUI.
The main innovations are an expressive modeling language for modeling applications graphical user
interface and a model transformation that lifts policy specified in security model to GUI model and validation
process that validates the models completeness and correctness which further enhances the security of the
application. Then finally a code generator for generating codes. It stipulates the access control policy and
provides a fine grained access control in the application. We propose the idea of using model transformations to
lift security policy. Here we improve and generalize the previous work and we provided updated presentation of
modeling languages, the toolkit, and the example applications that we developed.
Let us expand on main generalization with respect to previous work. In our work we now check
authorization before executing each events data action and we provide events with transaction semantics: either
all of the data actions are executed in given order, or none of them are executed at all. Over all contribution of
our work first, our methodology offers Model Driven Architecture’s purported benefits [1], [11] for data
Abstraction and Automation: A Software Design Approach for Developing Secure Data ….
DOI: 10.9790/0661-17325660 www.iosrjournals.org 57 | Page
management applications. By working with models, designers can specifically focus on application’s data,
behavior, security and presentation. Second the model transformation process leads to modularity and separation
of concerns this avoids problems that are mentioned with fine grained hardcoded security policies that are
difficult to maintain and audit. Finally our methodology supports validation process to ensure models
correctness. Since the quality of the generated code depends on the quality of the source model, validation plays
a vital role in our approach. This makes the Sculpture toolkit more powerful and securable for application
development than the previously witnessed toolkit discussed in related work
The secure data management application is developed using sculpture tool. Using Sculpture application
components are modeled and this model is transformed to deployable components. As a model driven
development approach, sculpture tool represents the next logical step in application development. It aims at
facilitating the automatic construction of a software solution from a high level domain specific specification.
This approach seeks to promote productivity, maintainability, expressiveness, and to aid in the management of
complexity by supporting higher levels of abstraction and the systematic reuse of domain specific assets.The
objective is to show that one can use our approach and sculpture toolkit to generate non toy secure data
management application with access control policy. The methodology and tool that we report on constitute a
substantial further development in [6],[5].
Applications
We report here on three web applications that we developed using Secure GUI tool known as Sculpture. The
main motive is to show that our methodology and toolkit supports for developing highly secure web application
in all aspects. We begin by briefly describing the application.
a) Volunteer Management (VM App).This is a web application for managing care centers volunteer
management. Using this application, the program’s coordinators can take actions such as: introduce new
volunteers; create, edit, and modify the tasks; and propose these tasks to the volunteers, based on the
volunteer’s time availability and preferences. The access control policy stipulates, that is the volunteers are
only authorized to edit their own personal information, such as their preferences and time availability, and
to accept or reject their own task.
b) Electronic Health Record Management (e HRM App).This is a web application for managing Electronic
health records. It allows users with the appropriate roles to: register new patients in hospital and assign to
them clinicians (doctor, nurses, etc); retrieve patient information; register new nurses and doctors in
hospital and assign them to respective wards; change doctors and nurses from one ward to another; and
move patients to different practice. The access control policy stipulates, in particular, access to patient’s
highly sensitive records. These records are allowed only to access by the respective doctors.
c) Meal Service Management (MSM App) :This is a web application for managing meal service in students
residential. Using this application, a resident can notify the administration weather he will have a meal at
the residence’s cafeteria, in which of the available time slots, and if he will bring a guest. A resident shall
only edit his own meal selection and within a specific time window, which depends on the selected meal.
Administrators can create new resident accounts, and list the meal requested foe each available time slot
This paper is organized as follows. System description is provided in Section II, Implementation of
proposed work is described in Section III, and the algorithm is described in Sections IV and Finally in Section V
experimental results are analyzed.
II. System Description:
The proposed work consists of the following system architecture. Here the modeling, design and secure
application development process is described with the help of the figure below.
Abstraction and Automation: A Software Design Approach for Developing Secure Data ….
DOI: 10.9790/0661-17325660 www.iosrjournals.org 58 | Page
III. Implementation And Working
Sculpture is a Model-Driven Development code generation framework, ideal for creating and managing
Enterprise Applications. With Sculpture the application components are modeled and then this model is
transformed to deployable components. The sculpture model is added to the development environment. It
contains diagram surface, toolbox, sculpture explorer, sculpture details and sculpture properties. It provides full
tool support for modeling and secure code generation.
Adding Mold: Sculpture comes with a host of readymade molds. Sculpture uses guidance package for building
own molds. The Sculpture Core Engine does nothing alone; just it needs to plug in to add the required molds
Mold Base: Is the base of all the other Molds; it contains all the common properties and activities that are
shared among the Molds. All Molds must be inherited from it directly or from another Mold.
SQL Server Mold: Concerns in all activities related to Microsoft SQL Server. The reverse engineering engine
parses the database and translates it to a model, so you can start the project from a database. Additionally, any
updates in the database schema can reflect on the model easily without losing any metadata. The reverse
engineering engine supports building entities from views to generate a script for the CRUD stored procedures,
and database schema, so application design starts from the model, the entities should be designed, then
generate the script of the database, and the script of the CRUD stored procedures.
LINQ Mold: This Mold generates LINQ to SQL entities, and Data Context, then generates repository classes
for each entity with the default data access methods (Get All, Get by Id, Find, Save) are additional actions
supported by our reported tool
Web Service Mold: This Mold does not generate any code, it just gathers the common properties for child web
service Molds (ASMX, WCF); and if we are in need to generate any kind of web service (ASMX or WCF), we
must include this Mold in the model
Designing Model: It includes designing entities, data contracts and services. Here reverse engineering tool is
used that is supported by SQL Server Mold to generate entities and its associations from the database of
application that we are generating. Data contacts are sometimes called data transfer object or value object. Using
sculpture data contract can be generated from entities. Data contracts are the objects that will propagate to the
higher level user interface. Instead of creating data contract for each entity manually, sculpture provides an
option to generate data contracts from entities automatically. As a next step, services have to be generated from
the data access method. Instead of creating services for each entity manually, sculpture provides an option to
generate services from entities automatically. Then the model is generated with entities, their relation with their
operations
Model Validation: Once the model is generated, it has to be validated. This validation process ensures the
completeness and correctness of the model. Since the quality of the generated code depends on the quality of the
source model. If the models do not specify the systems intended behavior, the generated system is not expected
to do either. So it is essential to validate the model. Model driven development tool called sculpture supports for
validation before performing automatic code generation for database actions. Sculpture provides validation rules
for the most common errors found in the model
Secure Code Generation
Moreover, sculpture includes a code generator which produces code for the respective database actions
and it gets attached to the respective project.
Application Generation
A three tier application is developed .The generated application is highly secure providing fine grained access.
Abstraction and Automation: A Software Design Approach for Developing Secure Data ….
DOI: 10.9790/0661-17325660 www.iosrjournals.org 59 | Page
1. Presentation tier (also known as front-end): Users access web applications through standard web browsers,
which render the content dynamically provided by the application server.
2. Application tier: The toolkit generates Web Application. It process client requests and, generate content,
which is sent back to the client for rendering.
3. Persistence tier (also known as data tier or back-end): The generated application manages information stored
in a database. This raises the security level in database.
IV. ALGORITHM
Model generation algorithm describes the generation of completely secure model which then forms a base for
secure code generation.
1. Model Generation (Database object, entities, data contracts, services, and model)
2. Initialize DBO to set of Data Base Object
3. For each of the DBO
4. Entity created ←Selected object
5 Add to model ←created entity
6 End For
7 For each of the entities in model
8 Generate data contract from entities
9 Add to model ← data contract
10 End For
11 For each entity
12 Add services to entity
13. Generate the services
14 Add to the model ←services
15 End For
16 generate Complete Model
Algorithm Description
As a first step, initialize DBO to set of Data Base Object. Then using Database object selector form, select each
of the database objects, for which entity needs to be created.
Entity created ←Selected object
The created entity will gets added in the model. Then for each of the entities which are added to the model,
generate data contracts from the respective entity. The data contracts are then added to the model.
Add to model ← data contract
The data contact establish mapping between the entity and its corresponding data contract. Then for each of the
entities in the model services that are required are added and finally services are generated .The generated
services are added to the model. There exist relation between the entity and the corresponding service.
Add to the model ←services
There exist relation between the entity and the corresponding service. Then the complete model is generated.
The generated model has association between entity, its data contract and with its corresponding services
V. Experimental Result
The presented approach enables a gradual approximation to system modeling towards data
management application by providing expressive modeling language for applications graphical user interface
and behavior, and it promotes model to model transformation that enhances the security policy. We can show
that it is possible to generate automatically complete deployable application.
Our methodology is supported by Sculpture toolkit. Real world application can be built using this
toolkit. It shows its full potential. In our work, the tools robustness is witnessed. The tool supports for validation
process, this shows that our work is a step ahead in model driven development paradigm. Moreover our
proposed methodology provides improved model editors, which is not supported by other tools and
methodology. Earlier tools and approaches contain simple model editors, so improved model editors which is
supported by our related tool provides further enhancement to our proposed approach. Nevertheless, there is still
much work ahead to turn toolkit support for GUI’s running on different platform like mobile devices. Further
Sculpture tool helps in developing highly secure web application by handling privacy policies efficiently
Abstraction and Automation: A Software Design Approach for Developing Secure Data ….
DOI: 10.9790/0661-17325660 www.iosrjournals.org 60 | Page
VI. Related Work
Various extensions of model driven approach have been presented over the past 15 years. Among
these, our work is closely related to UWE [7], [8],[9], and [4].UWE provides an augmented assistance to UWE
modeler. These models have to be appropriately refined as discussed in [4].
Busch [9] extends UWE to combine with secure UML for enhancing security. But it doesn’t work
because this does not support model transformation and validation process which is supported by our proposed
work. Similar to secure GUI, the ZOOM [14] approach allows modeler to specify widgets, their respective
events and associated actions. Moreover ZOOM does not support for code generation. The approaches presented
in [3],[2],[10] does not have language for modeling graphical user interface. In [10] the GUI’s are derived from
prototypical scenarios. There is other related work that falls between the two extremes of full GUI modeling and
full GUI derivation. Both the OO-method[12],[13] and webML [14],[15] support building GUIs using UI-
patterns. These approaches have the advantage of reducing the time required for modeling.
References
[1]. A.Kleppe, W.Bast, J.B.Warmer, and A.Watson,MDA Explained: The Model Driven Architecture-Practice and Promise. Addison-
Wesley, 2003
[2]. A.M.R.da Cruz and J.P Faria,” A metamodel-based Approach for Automatic user Interface Generation, ”proc.13th
Int’l Conf.
Model driven Eng. Languages and systems:part1(MODELS’10),Oct.2010,pp.256-270
[3]. A.M.R.da Cruz, ”Automatic Generation of User Interfaces from Rigorous Domain and Use Case Models,” PhD disssertation,
Univ.do Porto, Sept.2010.
[4]. C.Kroiss, N.Koch, and A.Knapp, “UWE4JSF: A Model-Driven Generation Approach for Web Applications,” Proc. Ninth Int’l
Conf.Wenb Engg. pp.493-496, (ICWE’09), 2009
[5]. D.A.Basin,M.Clavel,M.Egea, and M.Schlapter,” Automatic generation of Smart,security aware GUI Models,”Proc.Second Int’l
Symp.Eng .secure Software and systems(ESSoS’10),Feb.201,pp.201-217
[6]. D.A. Basin, M. Clavel, M. Egea, M.A.G. de Dios, C. Dania,G. Ortiz, and J. Valdazo, “Model-Driven Development of Security-
Aware GUIs for Data-Centric Applications,” Foundations of Security Analysis and Design VI, pp. 101-124, Springer, 2011.
[7]. [7] H.Baumeister, N.Koch, and L.Mandel, ”Towards a UML Extension for Hypermedia Design,” Proc. Second Int’l Conf. Unified
Modeling Language: Beyond the Standard, pp.614-629 (UML”99), 1999.
[8]. M.Busch and N.Koch,”MagicUWE-A Case tool plugin for Modeling Web Applications,” Proc.Ninth Int’l Conf.Web Engineering
pp.505-508, (ICWE’09), 2009
[9]. M.Busch,”Integration of Security Aspects in Web Engineering,”master’s thesis,Inst.fur Informatik,Ludwig-Maximilians-Univ.,2011
[10]. M.Elkoutbi, I.Khriss,and R.Keller, ”Automated Prototyping of User Interfaces Based on UML Scenarios,” Automated Software
Eng., vol.13, pp.5-40,2006
[11]. Object management Group,” Model Driven Architecture Guide v.1.0.1,” technical report, OMG, http;//www.omg.org/cgi-
bin/doc?omg/03-06-01,2003.
[12]. O.pastor,J.Gomez,E.Insfran, and V.Pelechano,”The OO-Method Approach for Information Systems modeling:From Object –
Oriented Conceptual Modeling to AutomatedProgramming,”InformationSystems,vol.26,no7,pp.507-534,2001
[13]. P.J.Molina , S.Melia and O.Pastor “Just-UI: A User Interface Specification Model,” Proc.Int’l Conf.Computer- Aided Design of
User Interfaces, pp.63-74 (CADUI’02),2002
[14]. S.Ceri and P.Frternali,”The web Modeling Language-WebML,”http;//www.webml.org,2003.
[15]. Web models Company,”Web Ratio-You Think,You Get,”http;//www.webratio.com,2010.
[16]. X.Jia, A.Steele, L.Qin, H.Liu and C.Jones, ”Executable Visual Software Modeling- The ZOOM Approach, ”Software Quality
Control , vol.15 pp.27-51, March 2007.

Mais conteúdo relacionado

Mais procurados

A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
 
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)ijcncs
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoptionijtsrd
 
360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service ProvidersIJERA Editor
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET Journal
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
Super convergence of autonomous things
Super convergence of autonomous thingsSuper convergence of autonomous things
Super convergence of autonomous thingsConference Papers
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution Conference Papers
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challengesEditor Jacotech
 
Cloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsCloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsIJERA Editor
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...ijcncs
 
IaaS Resource Usage Monitoring In cloud
IaaS Resource Usage Monitoring In cloudIaaS Resource Usage Monitoring In cloud
IaaS Resource Usage Monitoring In cloudijsrd.com
 
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...benzfire
 

Mais procurados (17)

A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...
 
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoption
 
360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers360º Degree Requirement Elicitation Framework for Cloud Service Providers
360º Degree Requirement Elicitation Framework for Cloud Service Providers
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
Super convergence of autonomous things
Super convergence of autonomous thingsSuper convergence of autonomous things
Super convergence of autonomous things
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challenges
 
Cloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsCloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patterns
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
 
Ju3617981704
Ju3617981704Ju3617981704
Ju3617981704
 
IaaS Resource Usage Monitoring In cloud
IaaS Resource Usage Monitoring In cloudIaaS Resource Usage Monitoring In cloud
IaaS Resource Usage Monitoring In cloud
 
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
The Roles and Challenges of Cloud Computing to Accounting System of Vietnames...
 
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
 

Destaque

Development of Human Tracking in Video Surveillance System for Activity Anal...
Development of Human Tracking in Video Surveillance System  for Activity Anal...Development of Human Tracking in Video Surveillance System  for Activity Anal...
Development of Human Tracking in Video Surveillance System for Activity Anal...IOSR Journals
 
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...IOSR Journals
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...
On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...
On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...IOSR Journals
 
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...Model-based Approach of Controller Design for a FOPTD System and its Real Tim...
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...IOSR Journals
 

Destaque (20)

A1103010108
A1103010108A1103010108
A1103010108
 
Development of Human Tracking in Video Surveillance System for Activity Anal...
Development of Human Tracking in Video Surveillance System  for Activity Anal...Development of Human Tracking in Video Surveillance System  for Activity Anal...
Development of Human Tracking in Video Surveillance System for Activity Anal...
 
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...
Effects of Eccentric Strength Training’s Time on Daily Plasma Testosterone Le...
 
B0541218
B0541218B0541218
B0541218
 
K017346572
K017346572K017346572
K017346572
 
H0964752
H0964752H0964752
H0964752
 
A0940104
A0940104A0940104
A0940104
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
J012265658
J012265658J012265658
J012265658
 
D1803041822
D1803041822D1803041822
D1803041822
 
F017264143
F017264143F017264143
F017264143
 
C012411728
C012411728C012411728
C012411728
 
G017644454
G017644454G017644454
G017644454
 
I0335458
I0335458I0335458
I0335458
 
A0460109
A0460109A0460109
A0460109
 
B0961015
B0961015B0961015
B0961015
 
On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...
On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...
On The Effect of Perturbations, Radiation and Triaxiality on the Stability of...
 
W01761157162
W01761157162W01761157162
W01761157162
 
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...Model-based Approach of Controller Design for a FOPTD System and its Real Tim...
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...
 
D010312127
D010312127D010312127
D010312127
 

Semelhante a J017325660

Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxwhitneyleman54422
 
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...ijitjournal
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation IJECEIAES
 
New Model to Achieve Software Quality Assurance (SQA) in Web Application
New Model to Achieve Software Quality Assurance (SQA) in Web ApplicationNew Model to Achieve Software Quality Assurance (SQA) in Web Application
New Model to Achieve Software Quality Assurance (SQA) in Web Applicationijsrd.com
 
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET Journal
 
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET Journal
 
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...cscpconf
 
COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...
COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...
COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...ijseajournal
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices FrameworkSujata Raskar
 
project on Agile approach
project on Agile approachproject on Agile approach
project on Agile approachPrachi desai
 
Ijsred v2 i5p95
Ijsred v2 i5p95Ijsred v2 i5p95
Ijsred v2 i5p95IJSRED
 
Web–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive GraphsWeb–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive GraphsMike Taylor
 
Web–based crm application with interactive graphs
Web–based crm application with interactive graphsWeb–based crm application with interactive graphs
Web–based crm application with interactive graphsMike Taylor
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideHCLSoftware
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerHCLSoftware
 
Model for Identifying the Security of a System: A Case Study of Point Of Sale...
Model for Identifying the Security of a System: A Case Study of Point Of Sale...Model for Identifying the Security of a System: A Case Study of Point Of Sale...
Model for Identifying the Security of a System: A Case Study of Point Of Sale...IOSR Journals
 
Chapter_01.ppt
Chapter_01.pptChapter_01.ppt
Chapter_01.pptMSahibKhan
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...IJNSA Journal
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...IJNSA Journal
 

Semelhante a J017325660 (20)

Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docx
 
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
 
New Model to Achieve Software Quality Assurance (SQA) in Web Application
New Model to Achieve Software Quality Assurance (SQA) in Web ApplicationNew Model to Achieve Software Quality Assurance (SQA) in Web Application
New Model to Achieve Software Quality Assurance (SQA) in Web Application
 
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
 
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application System
 
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
 
COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...
COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...
COMBINING REUSABLE TEST CASES AND CONTINUOUS SECURITY TESTING FOR REDUCING WE...
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
project on Agile approach
project on Agile approachproject on Agile approach
project on Agile approach
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Ijsred v2 i5p95
Ijsred v2 i5p95Ijsred v2 i5p95
Ijsred v2 i5p95
 
Web–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive GraphsWeb–Based CRM Application with Interactive Graphs
Web–Based CRM Application with Interactive Graphs
 
Web–based crm application with interactive graphs
Web–based crm application with interactive graphsWeb–based crm application with interactive graphs
Web–based crm application with interactive graphs
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
Model for Identifying the Security of a System: A Case Study of Point Of Sale...
Model for Identifying the Security of a System: A Case Study of Point Of Sale...Model for Identifying the Security of a System: A Case Study of Point Of Sale...
Model for Identifying the Security of a System: A Case Study of Point Of Sale...
 
Chapter_01.ppt
Chapter_01.pptChapter_01.ppt
Chapter_01.ppt
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
 
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
A SECURITY EVALUATION FRAMEWORK FOR U.K. E-GOVERNMENT SERVICES AGILE SOFTWARE...
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

J017325660

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May – Jun. 2015), PP 56-60 www.iosrjournals.org DOI: 10.9790/0661-17325660 www.iosrjournals.org 56 | Page Abstraction and Automation: A Software Design Approach for Developing Secure Data Management Application. C. Bharathipriya Gkm College Of Engineering And Technology, Chennai Abstract: Security plays a vital role in data management application. For this purpose while developing, three different views of applications are modeled namely conceptual, security and GUI model. It formalizes the objects of problem, applications security and Graphical user interface respectively. A model transformation process occurs, which shifts policy specified in security to GUI model. To ensure model’s correctness validation process is carried out and as a final step, a code generator will generate a multi-tier application along with access control support. The applications are built using our related tool. Index terms: conceptual model, validation, model driven security, authorization constraints I. Introduction Building up of models is the heart of design system. In many engineering disciplines it is off course a true fact and it is specially increasing in the case of Software Engineering. Model driven engineering which is a software development methodology aims to build models of different system from which artifacts such as code gets automatically generated. The abstraction and automation approach is one such model driven development approach that shifts software development from code to modeling. The model driven approach can deliver its full potential: that mean, it’s capable of producing secure Graphical user interface for data management application. In particular the data management applications focus on CRUD action: that is CREATE, READ, UPDATE and DELETE ACTIONS. All applications contain these operations as their building blocks. For example dynamic website users used to create their own account, read information from it, update information, store and also delete the information and data. In such cases the data’s of the users has to be secured against unauthorized access. For restricting unauthorized access, providing access control policies is standard approach. But if the access control policies are simple, it may be possible to formalize. In such cases protecting data’s is a difficult task. In multi-tier system, usually Role based access control is built on application server. In contrast fine grained access control policies depends on two facts namely user credentials and satisfaction of certain constraints on persistence layers state. In these cases mentioned above, the authorization checks are encoded in appropriate places programmatically. But the true fact is these programmatic addition leads to some error, inflexibility and poor scale in performance. Moreover auditing and maintaining is difficult in these cases. This is because the authorization checks are spread throughout the code. And change in security policy requires code changes. To overcome these, we propose an approach for model driven development in order to develop secure data management application. . Using our methodology a secure application is modeled using three communicable models namely: 1. A conceptual model defines the activities of conceptual design like finding classes, specifying attributes, operations. 2. A security model defines applications security. It provides an authorized access to data’s on conceptual model. 3. Thirdly a graphical user interface model specifies applications GUI. The main innovations are an expressive modeling language for modeling applications graphical user interface and a model transformation that lifts policy specified in security model to GUI model and validation process that validates the models completeness and correctness which further enhances the security of the application. Then finally a code generator for generating codes. It stipulates the access control policy and provides a fine grained access control in the application. We propose the idea of using model transformations to lift security policy. Here we improve and generalize the previous work and we provided updated presentation of modeling languages, the toolkit, and the example applications that we developed. Let us expand on main generalization with respect to previous work. In our work we now check authorization before executing each events data action and we provide events with transaction semantics: either all of the data actions are executed in given order, or none of them are executed at all. Over all contribution of our work first, our methodology offers Model Driven Architecture’s purported benefits [1], [11] for data
  • 2. Abstraction and Automation: A Software Design Approach for Developing Secure Data …. DOI: 10.9790/0661-17325660 www.iosrjournals.org 57 | Page management applications. By working with models, designers can specifically focus on application’s data, behavior, security and presentation. Second the model transformation process leads to modularity and separation of concerns this avoids problems that are mentioned with fine grained hardcoded security policies that are difficult to maintain and audit. Finally our methodology supports validation process to ensure models correctness. Since the quality of the generated code depends on the quality of the source model, validation plays a vital role in our approach. This makes the Sculpture toolkit more powerful and securable for application development than the previously witnessed toolkit discussed in related work The secure data management application is developed using sculpture tool. Using Sculpture application components are modeled and this model is transformed to deployable components. As a model driven development approach, sculpture tool represents the next logical step in application development. It aims at facilitating the automatic construction of a software solution from a high level domain specific specification. This approach seeks to promote productivity, maintainability, expressiveness, and to aid in the management of complexity by supporting higher levels of abstraction and the systematic reuse of domain specific assets.The objective is to show that one can use our approach and sculpture toolkit to generate non toy secure data management application with access control policy. The methodology and tool that we report on constitute a substantial further development in [6],[5]. Applications We report here on three web applications that we developed using Secure GUI tool known as Sculpture. The main motive is to show that our methodology and toolkit supports for developing highly secure web application in all aspects. We begin by briefly describing the application. a) Volunteer Management (VM App).This is a web application for managing care centers volunteer management. Using this application, the program’s coordinators can take actions such as: introduce new volunteers; create, edit, and modify the tasks; and propose these tasks to the volunteers, based on the volunteer’s time availability and preferences. The access control policy stipulates, that is the volunteers are only authorized to edit their own personal information, such as their preferences and time availability, and to accept or reject their own task. b) Electronic Health Record Management (e HRM App).This is a web application for managing Electronic health records. It allows users with the appropriate roles to: register new patients in hospital and assign to them clinicians (doctor, nurses, etc); retrieve patient information; register new nurses and doctors in hospital and assign them to respective wards; change doctors and nurses from one ward to another; and move patients to different practice. The access control policy stipulates, in particular, access to patient’s highly sensitive records. These records are allowed only to access by the respective doctors. c) Meal Service Management (MSM App) :This is a web application for managing meal service in students residential. Using this application, a resident can notify the administration weather he will have a meal at the residence’s cafeteria, in which of the available time slots, and if he will bring a guest. A resident shall only edit his own meal selection and within a specific time window, which depends on the selected meal. Administrators can create new resident accounts, and list the meal requested foe each available time slot This paper is organized as follows. System description is provided in Section II, Implementation of proposed work is described in Section III, and the algorithm is described in Sections IV and Finally in Section V experimental results are analyzed. II. System Description: The proposed work consists of the following system architecture. Here the modeling, design and secure application development process is described with the help of the figure below.
  • 3. Abstraction and Automation: A Software Design Approach for Developing Secure Data …. DOI: 10.9790/0661-17325660 www.iosrjournals.org 58 | Page III. Implementation And Working Sculpture is a Model-Driven Development code generation framework, ideal for creating and managing Enterprise Applications. With Sculpture the application components are modeled and then this model is transformed to deployable components. The sculpture model is added to the development environment. It contains diagram surface, toolbox, sculpture explorer, sculpture details and sculpture properties. It provides full tool support for modeling and secure code generation. Adding Mold: Sculpture comes with a host of readymade molds. Sculpture uses guidance package for building own molds. The Sculpture Core Engine does nothing alone; just it needs to plug in to add the required molds Mold Base: Is the base of all the other Molds; it contains all the common properties and activities that are shared among the Molds. All Molds must be inherited from it directly or from another Mold. SQL Server Mold: Concerns in all activities related to Microsoft SQL Server. The reverse engineering engine parses the database and translates it to a model, so you can start the project from a database. Additionally, any updates in the database schema can reflect on the model easily without losing any metadata. The reverse engineering engine supports building entities from views to generate a script for the CRUD stored procedures, and database schema, so application design starts from the model, the entities should be designed, then generate the script of the database, and the script of the CRUD stored procedures. LINQ Mold: This Mold generates LINQ to SQL entities, and Data Context, then generates repository classes for each entity with the default data access methods (Get All, Get by Id, Find, Save) are additional actions supported by our reported tool Web Service Mold: This Mold does not generate any code, it just gathers the common properties for child web service Molds (ASMX, WCF); and if we are in need to generate any kind of web service (ASMX or WCF), we must include this Mold in the model Designing Model: It includes designing entities, data contracts and services. Here reverse engineering tool is used that is supported by SQL Server Mold to generate entities and its associations from the database of application that we are generating. Data contacts are sometimes called data transfer object or value object. Using sculpture data contract can be generated from entities. Data contracts are the objects that will propagate to the higher level user interface. Instead of creating data contract for each entity manually, sculpture provides an option to generate data contracts from entities automatically. As a next step, services have to be generated from the data access method. Instead of creating services for each entity manually, sculpture provides an option to generate services from entities automatically. Then the model is generated with entities, their relation with their operations Model Validation: Once the model is generated, it has to be validated. This validation process ensures the completeness and correctness of the model. Since the quality of the generated code depends on the quality of the source model. If the models do not specify the systems intended behavior, the generated system is not expected to do either. So it is essential to validate the model. Model driven development tool called sculpture supports for validation before performing automatic code generation for database actions. Sculpture provides validation rules for the most common errors found in the model Secure Code Generation Moreover, sculpture includes a code generator which produces code for the respective database actions and it gets attached to the respective project. Application Generation A three tier application is developed .The generated application is highly secure providing fine grained access.
  • 4. Abstraction and Automation: A Software Design Approach for Developing Secure Data …. DOI: 10.9790/0661-17325660 www.iosrjournals.org 59 | Page 1. Presentation tier (also known as front-end): Users access web applications through standard web browsers, which render the content dynamically provided by the application server. 2. Application tier: The toolkit generates Web Application. It process client requests and, generate content, which is sent back to the client for rendering. 3. Persistence tier (also known as data tier or back-end): The generated application manages information stored in a database. This raises the security level in database. IV. ALGORITHM Model generation algorithm describes the generation of completely secure model which then forms a base for secure code generation. 1. Model Generation (Database object, entities, data contracts, services, and model) 2. Initialize DBO to set of Data Base Object 3. For each of the DBO 4. Entity created ←Selected object 5 Add to model ←created entity 6 End For 7 For each of the entities in model 8 Generate data contract from entities 9 Add to model ← data contract 10 End For 11 For each entity 12 Add services to entity 13. Generate the services 14 Add to the model ←services 15 End For 16 generate Complete Model Algorithm Description As a first step, initialize DBO to set of Data Base Object. Then using Database object selector form, select each of the database objects, for which entity needs to be created. Entity created ←Selected object The created entity will gets added in the model. Then for each of the entities which are added to the model, generate data contracts from the respective entity. The data contracts are then added to the model. Add to model ← data contract The data contact establish mapping between the entity and its corresponding data contract. Then for each of the entities in the model services that are required are added and finally services are generated .The generated services are added to the model. There exist relation between the entity and the corresponding service. Add to the model ←services There exist relation between the entity and the corresponding service. Then the complete model is generated. The generated model has association between entity, its data contract and with its corresponding services V. Experimental Result The presented approach enables a gradual approximation to system modeling towards data management application by providing expressive modeling language for applications graphical user interface and behavior, and it promotes model to model transformation that enhances the security policy. We can show that it is possible to generate automatically complete deployable application. Our methodology is supported by Sculpture toolkit. Real world application can be built using this toolkit. It shows its full potential. In our work, the tools robustness is witnessed. The tool supports for validation process, this shows that our work is a step ahead in model driven development paradigm. Moreover our proposed methodology provides improved model editors, which is not supported by other tools and methodology. Earlier tools and approaches contain simple model editors, so improved model editors which is supported by our related tool provides further enhancement to our proposed approach. Nevertheless, there is still much work ahead to turn toolkit support for GUI’s running on different platform like mobile devices. Further Sculpture tool helps in developing highly secure web application by handling privacy policies efficiently
  • 5. Abstraction and Automation: A Software Design Approach for Developing Secure Data …. DOI: 10.9790/0661-17325660 www.iosrjournals.org 60 | Page VI. Related Work Various extensions of model driven approach have been presented over the past 15 years. Among these, our work is closely related to UWE [7], [8],[9], and [4].UWE provides an augmented assistance to UWE modeler. These models have to be appropriately refined as discussed in [4]. Busch [9] extends UWE to combine with secure UML for enhancing security. But it doesn’t work because this does not support model transformation and validation process which is supported by our proposed work. Similar to secure GUI, the ZOOM [14] approach allows modeler to specify widgets, their respective events and associated actions. Moreover ZOOM does not support for code generation. The approaches presented in [3],[2],[10] does not have language for modeling graphical user interface. In [10] the GUI’s are derived from prototypical scenarios. There is other related work that falls between the two extremes of full GUI modeling and full GUI derivation. Both the OO-method[12],[13] and webML [14],[15] support building GUIs using UI- patterns. These approaches have the advantage of reducing the time required for modeling. References [1]. A.Kleppe, W.Bast, J.B.Warmer, and A.Watson,MDA Explained: The Model Driven Architecture-Practice and Promise. Addison- Wesley, 2003 [2]. A.M.R.da Cruz and J.P Faria,” A metamodel-based Approach for Automatic user Interface Generation, ”proc.13th Int’l Conf. Model driven Eng. Languages and systems:part1(MODELS’10),Oct.2010,pp.256-270 [3]. A.M.R.da Cruz, ”Automatic Generation of User Interfaces from Rigorous Domain and Use Case Models,” PhD disssertation, Univ.do Porto, Sept.2010. [4]. C.Kroiss, N.Koch, and A.Knapp, “UWE4JSF: A Model-Driven Generation Approach for Web Applications,” Proc. Ninth Int’l Conf.Wenb Engg. pp.493-496, (ICWE’09), 2009 [5]. D.A.Basin,M.Clavel,M.Egea, and M.Schlapter,” Automatic generation of Smart,security aware GUI Models,”Proc.Second Int’l Symp.Eng .secure Software and systems(ESSoS’10),Feb.201,pp.201-217 [6]. D.A. Basin, M. Clavel, M. Egea, M.A.G. de Dios, C. Dania,G. Ortiz, and J. Valdazo, “Model-Driven Development of Security- Aware GUIs for Data-Centric Applications,” Foundations of Security Analysis and Design VI, pp. 101-124, Springer, 2011. [7]. [7] H.Baumeister, N.Koch, and L.Mandel, ”Towards a UML Extension for Hypermedia Design,” Proc. Second Int’l Conf. Unified Modeling Language: Beyond the Standard, pp.614-629 (UML”99), 1999. [8]. M.Busch and N.Koch,”MagicUWE-A Case tool plugin for Modeling Web Applications,” Proc.Ninth Int’l Conf.Web Engineering pp.505-508, (ICWE’09), 2009 [9]. M.Busch,”Integration of Security Aspects in Web Engineering,”master’s thesis,Inst.fur Informatik,Ludwig-Maximilians-Univ.,2011 [10]. M.Elkoutbi, I.Khriss,and R.Keller, ”Automated Prototyping of User Interfaces Based on UML Scenarios,” Automated Software Eng., vol.13, pp.5-40,2006 [11]. Object management Group,” Model Driven Architecture Guide v.1.0.1,” technical report, OMG, http;//www.omg.org/cgi- bin/doc?omg/03-06-01,2003. [12]. O.pastor,J.Gomez,E.Insfran, and V.Pelechano,”The OO-Method Approach for Information Systems modeling:From Object – Oriented Conceptual Modeling to AutomatedProgramming,”InformationSystems,vol.26,no7,pp.507-534,2001 [13]. P.J.Molina , S.Melia and O.Pastor “Just-UI: A User Interface Specification Model,” Proc.Int’l Conf.Computer- Aided Design of User Interfaces, pp.63-74 (CADUI’02),2002 [14]. S.Ceri and P.Frternali,”The web Modeling Language-WebML,”http;//www.webml.org,2003. [15]. Web models Company,”Web Ratio-You Think,You Get,”http;//www.webratio.com,2010. [16]. X.Jia, A.Steele, L.Qin, H.Liu and C.Jones, ”Executable Visual Software Modeling- The ZOOM Approach, ”Software Quality Control , vol.15 pp.27-51, March 2007.