A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements

Author(s):  
Roman Wirtz ◽  
Maritta Heisel
Author(s):  
Akram AbdelKarim AbdelQader

Software requirements with its functional and non-functional methods are the first important phase in producing a software system with free errors. The functional requirements are the visual actions that may easily evaluated from the developer and from the user, but non-functional requirements are not visual and need a lot of efforts to be evaluated. One of the main important non-functional requirements is security, which focuses on generating secure systems from strangers. Evaluating the security of the system in earlier steps will help to reduce the efforts of reveals critical system threats. Security threats found because of leaking of security scenarios in requirement phase. In this paper, we purpose an intelligent model to extract and evaluate security features from scenarios based on set of security system goals and a set of security requirements saved on rich story scenarios dataset (RSSD). This model will used a support vector machine (SVM) classifier to classify the security requirement based on RSS dataset.  The using of SVM will enhance the overall process of evaluating the security requirements. The results show a significant enhancement in security improvements.


2016 ◽  
Vol 21 (6) ◽  
pp. 5-11
Author(s):  
E. Randolph Soo Hoo ◽  
Stephen L. Demeter

Abstract Referring agents may ask independent medical evaluators if the examinee can return to work in either a normal or a restricted capacity; similarly, employers may ask external parties to conduct this type of assessment before a hire or after an injury. Functional capacity evaluations (FCEs) are used to measure agility and strength, but they have limitations and use technical jargon or concepts that can be confusing. This article clarifies key terms and concepts related to FCEs. The basic approach to a job analysis is to collect information about the job using a variety of methods, analyze the data, and summarize the data to determine specific factors required for the job. No single, optimal job analysis or validation method is applicable to every work situation or company, but the Equal Employment Opportunity Commission offers technical standards for each type of validity study. FCEs are a systematic method of measuring an individual's ability to perform various activities, and results are matched to descriptions of specific work-related tasks. Results of physical abilities/agilities tests are reported as “matching” or “not matching” job demands or “pass” or “fail” meeting job criteria. Individuals who fail an employment physical agility test often challenge the results on the basis that the test was poorly conducted, that the test protocol was not reflective of the job, or that levels for successful completion were inappropriate.


1998 ◽  
Vol 37 (01) ◽  
pp. 16-25 ◽  
Author(s):  
P. Ringleb ◽  
T. Steiner ◽  
P. Knaup ◽  
W. Hacke ◽  
R. Haux ◽  
...  

Abstract:Today, the demand for medical decision support to improve the quality of patient care and to reduce costs in health services is generally recognized. Nevertheless, decision support is not yet established in daily routine within hospital information systems which often show a heterogeneous architecture but offer possibilities of interoperability. Currently, the integration of decision support functions into clinical workstations is the most promising way. Therefore, we first discuss aspects of integrating decision support into clinical workstations including clinical needs, integration of database and knowledge base, knowledge sharing and reuse and the role of standardized terminology. In addition, we draw up functional requirements to support the physician dealing with patient care, medical research and administrative tasks. As a consequence, we propose a general architecture of an integrated knowledge-based clinical workstation. Based on an example application we discuss our experiences concerning clinical applicability and relevance. We show that, although our approach promotes the integration of decision support into hospital information systems, the success of decision support depends above all on an adequate transformation of clinical needs.


2019 ◽  
Vol 22 (4) ◽  
pp. 336-341
Author(s):  
D. V. Ivanov ◽  
D. A. Moskvin

In the article the approach and methods of ensuring the security of VANET-networks based on automated counteraction to information security threats through self-regulation of the network structure using the theory of fractal graphs is provided.


2020 ◽  
Vol 22 (1) ◽  
pp. 35-52
Author(s):  
Jeffrey Escoffier

After the publication of his pioneering book Sexual Excitement in 1979, Robert Stoller devoted the last 12 years of his life to the study of the pornographic film industry. To do so, he conducted an ethnographic study of people working in the industry in order to find out how it produced ‘perverse fantasies’ that successfully communicated sexual excitement to other people. In the course of his investigation he observed and interviewed those involved in the making of pornographic films. He hypothesized that the ‘scenarios’ developed and performed by people in the porn industry were based on their own perverse fantasies and their frustrations, injuries and conflicts over sexuality and gender; and that the porn industry had developed a systematic method and accumulated a sophisticated body of knowledge about the production of sexual excitement. This paper explores Stoller's theses and shows how they fared in his investigation.


Sign in / Sign up

Export Citation Format

Share Document