• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 20
  • 1
  • Tagged with
  • 22
  • 22
  • 22
  • 22
  • 19
  • 10
  • 10
  • 10
  • 8
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Security Testing for Web Applications in SDLC / Security Testing for Web Applications in SDLC

Srilatha, Rondla, Someshwar, Gande January 2011 (has links)
Context: In Web applications, the Software vulnerability can be reduced by applying security testing in all phases of the software development life cycle (SDLC). Lot of vulnerabilities might occur if the security testing is applied in the last phase of SDLC. In order to mitigate these vulnerabilities, a lot of rework is required that involves reverse engineering in the development and design phases. To overcome this situation, organizations are shifting from security testing (performed in last phase) towards security testing in the early phases of SDLC. Objectives: The main objectives of this thesis are to gather the benefits and challenges of security testing in the last phase versus security testing in every phase of the SDLC. After gathering, authors want to compare both implementations because these days most organizations are shifting from last phase to every phase of SDLC. Justification to the reason can be achieved by this comparison. Methods: In order to satisfy the objectives of this thesis, a literature review and interviews were conducted. The literature review was conducted by gathering benefits and challenges of last phase and every phase of SDLC. Authors have applied coding technique to the data gathered from literature review. By using the results from literature review, a set of questions were framed. Based on these questions, interviews in various organizations were performed. To analyze the practitioner’s data we used Sorting and Coding technique. Then, we conducted a comparative analysis to compare both results. Results: Application of security testing in the last phase of the SDLC results in a lot of rework which in turn leads to instability in managing the cost, time and resources in an organisation. In order to overcome this, more and more organisations are introducing security testing at each and every phase of SDLC. Conclusions: It can be concluded that every phase of security testing in SDLC has more benefits than applying in last phase of SDLC. To evaluate this process more research is needed to acquire more knowledge of security testing in all phases of SDLC. Through literature review and interviews conducted, it is evident that security testing at early phases causes a reduction in rework which in turn leads to more efficient management of cost, time and resources of a project. / +91 8977404640
2

Integrating secure programming concepts in introductory programming courses

Jama, Fartun January 2020 (has links)
The number of vulnerable systems with exploitable security defects has increased. This led to an increase in the demand for secure software systems. Software developers lack security experiences to design and build secure software, some even believe security is not their responsibility. Despite the increased need for teaching security and secure programming, security is not well integrated into the undergraduate computing curriculum and is only offered as part of a program or as an elective course. The aim of this project is to outline the importance of incorporating security and secure programming concepts in programming courses starting from the introductory courses. By evaluating the students' security consideration and knowledge regarding software security. As a result, based on the knowledge students lack regarding software security, security and secure programming concepts are identified which need to be integrated into the programming courses.
3

A step toward understanding software development in the public sector: a study of a Department of Defense research and development organization

Church, Joshua Q. 12 May 2023 (has links) (PDF)
This paper focuses on the importance of effective software development processes and a foundational understanding of success factors in the public sector. Although there has been significant investment in information technology, not all public sector software projects result in a successful return on investment. This study explores the crucial factors, referred to as Critical Success Factors (CSFs), that enable the success of public sector software development projects. Additionally, this study aims to discover if the CSFs, the Software Development Life Cycle (SDLC), or its methodologies are more impactful for the success of software projects. This study aims to also identify the challenges public sector developers face during their efforts. By analyzing empirical data collected from a US Department of Defense Research and Development organization, this research aims to provide essential information for improving the likelihood of successful software project outcomes. Ultimately, this research can enable decision-makers to create better training opportunities, standard operating procedures, and hiring processes for public sector software projects.
4

Investigate the benefits and challenges of adopting the DevOps culture

Taleb, Abdo January 2022 (has links)
Companies follow different approaches in the life cycle of software, but usually, activities are divided into different teams, the most important teams are the development team and the operations team. Often the goals of the operations team and the development team are different, which results in an escalating relationship between the two teams, and a conflict occurs between teams due to the blame of responsibility on each other, which in turn leads to long delivery periods and ineffective delivery methods. To solve these problems, the DevOps approach emerged, which is an acronym for the two words development and operations. This approach aims to align both the development team and the operations team and break the barriers between them by working as one team toward a single goal that shares everyone the responsibility. Thus, the speed of the program delivery process increases and the company provides better services to its customers. Since DevOps is a new approach and many companies tend to adopt this approach, this study aims to investigate the benefits of the DevOps approach and the challenges involved in adopting this approach. This study summarized that the adoption of DevOps approach has an impact on the companies in several aspects. The research presents the most important challenges that the DevOps attempts to overcome, DevOps tools that helps to achieve the value of DevOps, and the benefits of the DevOps approach.
5

The CSCW paradigm for software development

Viljoen, Zelda 06 1900 (has links)
People work together to solve a wide variety of problems using different forms of cooperation for each class of problem. Modern technology is complex, and therefore it is unusual for an individual to attempt the development of a major project single-handedly. In an attempt to provide computer-based support for the problems that arise when two or more people attempt to cooperate to perform a task or solve a problem, the area of Computer Supported Cooperative Work (CSCW) becomes relevant. The software development process almost invariably involves cooperation that crosses group, professional, and subcultural boundaries. The complexity of software development demands that highly integrated groups of analysts, designers, and users are involved in the process. Many development activities may occur concurrently. The area of CSCW and advanced information technology, with its enormous capabilities for transmitting and storing information, holds considerable promise for the software development process. / Computing / M. Sc. (Information Systems)
6

Developing A Secure Web Service for License Management in StruSoft

Russell, Dave Alfanso January 2005 (has links)
<p>As software increases in complexity and relies more on Internet and Web technology, the challenge of enabling interaction and communication between loosely coupled applications becomes increasingly vital. Distributed computing presents challenges to loosely coupled applications that require means with which to interact and communicate. There exist technologies that are aimed at solving these problems; Web service is one such technology. Web service is a relatively new and rapidly maturing technology in the area of distributed computing; it offers a standards-based way to exchange information in an interoperable manner. This thesis is done in partnership with StruSoft and attempts to provide a solution to their problem of distributed computing, by using Web service technology. The paper looks at distributed systems and various solutions to the problems associated with distributed computing. A comprehensive insight into Web service technology is provided, along with rationale as to why it is chosen for the project. In addition, there are guidelines as to how the necessary components of Web service are installed. Development of License Management Software is also a part of this thesis. The software offers a means with which to store and maintain data about customers and their licenses. Security is a major focus of this paper and thus extensively mentioned throughout. A detailedexplanation of computer security is presented, along with the necessary configurations that are needed to make the Web service and the License Management Software more secure.</p>
7

The CSCW paradigm for software development

Viljoen, Zelda 06 1900 (has links)
People work together to solve a wide variety of problems using different forms of cooperation for each class of problem. Modern technology is complex, and therefore it is unusual for an individual to attempt the development of a major project single-handedly. In an attempt to provide computer-based support for the problems that arise when two or more people attempt to cooperate to perform a task or solve a problem, the area of Computer Supported Cooperative Work (CSCW) becomes relevant. The software development process almost invariably involves cooperation that crosses group, professional, and subcultural boundaries. The complexity of software development demands that highly integrated groups of analysts, designers, and users are involved in the process. Many development activities may occur concurrently. The area of CSCW and advanced information technology, with its enormous capabilities for transmitting and storing information, holds considerable promise for the software development process. / Computing / M. Sc. (Information Systems)
8

Developing A Secure Web Service for License Management in StruSoft

Russell, Dave Alfanso January 2005 (has links)
As software increases in complexity and relies more on Internet and Web technology, the challenge of enabling interaction and communication between loosely coupled applications becomes increasingly vital. Distributed computing presents challenges to loosely coupled applications that require means with which to interact and communicate. There exist technologies that are aimed at solving these problems; Web service is one such technology. Web service is a relatively new and rapidly maturing technology in the area of distributed computing; it offers a standards-based way to exchange information in an interoperable manner. This thesis is done in partnership with StruSoft and attempts to provide a solution to their problem of distributed computing, by using Web service technology. The paper looks at distributed systems and various solutions to the problems associated with distributed computing. A comprehensive insight into Web service technology is provided, along with rationale as to why it is chosen for the project. In addition, there are guidelines as to how the necessary components of Web service are installed. Development of License Management Software is also a part of this thesis. The software offers a means with which to store and maintain data about customers and their licenses. Security is a major focus of this paper and thus extensively mentioned throughout. A detailedexplanation of computer security is presented, along with the necessary configurations that are needed to make the Web service and the License Management Software more secure.
9

Transforming Requirements to Ontologies

Ahmed, Saqib, Ahmad, Bilal January 2020 (has links)
Capturing client’s needs and expectations for a product or service is an important problem in software development. Software requirements are normally captured in natural language and mostly they are unstructured which makes it difficult to automate the process of going from software requirements to the executable code. A big hurdle in this process is the lack of consistency and standardization in software requirements representation. Thus, the aim of the thesis is to present a method for transforming natural language requirement text into ontology. It is easy to store and retrieve information from ontology as it is a semantic model, and it is also easy to infer new knowledge from it. As it is clear from the aim of this work, the main component of our research was software requirements, so there was a need to investigate and decide the types of requirements to define the scope of this research. We selected INCOSE guidelines as a benchmark to scrutinize the properties which we desired in the Natural Language Requirements. These natural language requirements were used in the form of user stories as the input of the transformation process. We selected a combination of two methods for our research i.e. Literature Review and Design Science Research. The reason for selecting these methods was to obtain a good grip on existing work going on in this field and then to combine the knowledge to propose new rules for the requirements to ontology transformation. We studied different domains during literature review such as Requirements Engineering, Ontologies, Natural Language Processing, and Information Extraction. The gathered knowledge was then used to propose the rules and the flow of their implementation. This proposed system was named as “Reqtology”. Reqtology defines the process, from taking the requirements in form of user stories, to extracting the useful information based on the rules and then classifying that information so that it can be used to form ontologies. The workflow consists of a 6-step process which starts from input text in form of user stories and at the end provides us entities which can be used for ontologies formation.
10

Zajištění kvality webových aplikací pomocí nástrojů automatického testování / Web Applications Quality Assurance Using Automated Testing Tools

Reš, Radim January 2014 (has links)
The subject of this thesis is web applications quality assurance using automated testing tools. The main goal of this thesis is design and implementation solution for automated regression testing of map web application. In the first chapter are described principles of software quality assurance focused to software testing. After that follows chapter about the possibility of automatic software testing based on analysis tools available to support automated testing of web applications. Next chapters of this thesis are devoted to choosing the ideal tool of automated testing, design and implementation of solutions for automated regression testing of web map application.

Page generated in 0.2156 seconds