Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 10

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
1
EN
Recent developments in Polish legislation concerning the healthiness of products in schools shops and results of law compliance verification resulted in a need for a way to supervise purchases in school shops. In this article, a solution for this problem is presented in a form of an online payment platform utilizing virtual currency called eZloty. The platform is based on blockchain technology which allows storing transaction history in an immutable form. As a result, eZloty payment system would enable supervision of products bought in schools, thus creating a possibility for more directed actions promoting healthy food and compliance with ministry regulations.
EN
Software testing is a very broad term that includes a wide variety of topics. They range from technical like testing techniques and measurements, to more organizational like planning and management of testing. Ability to plan, design and create efficient tests is the most critical ability for any good tester. The paper presents Kungfu Testing, which is a testing approach based on advice and best practices advocated by experts in the field of testing. The method is intended to provide a step-by-step instruction of managing testing activities in a project environment. The presented approach was designed to work with and complement the agile development methodologies due to their widespread use and popularity.
EN
With the growing number of IT projects and their complexity their deeper analysis became necessary. For this purpose, the historical data on previously completed projects began to collect – it has enabled projects undergo a detailed analysis, which allowed the efficient implementation of projects and allowed in advance to detect the potential problems. Thus a new area of research, Mining Software Repository (MSR), was born. Research in the field of MSR brings very promising results. The increasing importance of research for gaining the tools to support the process of collecting and analyzing the data related to software development is observed. The data from version control systems, bug tracking systems and issue tracking systems is the most popular. This paper presents the existing MSR tools carries out its analysis and describes the weaknesses of each individual solutions.
EN
Nowadays electronic world is being introduced into every area of our life. The smart car is a new generation of smartphone, very useful and necessary for many of us to live. That is why a lot of producers try to thrive in this area. Over the last twenty years people experienced a rapid progress in the telephone branch, probably in over next twenty years they would expect the same situation on cars field. The problem presented in the paper concerns the possibility of creating a mobile application for management and control of a smart car.
5
Content available Secure development model for mobile applications
EN
The development of mobile applications plays an increasingly important role in everyday lives of a visibly growing number of smartphone and tablet users. This trend contributes to changes in corporate management techniques, which now turn towards establishing new standards of data management and extending the functionalities of existing systems to enable the users to benefit from the newest technological advances by creating mobile applications. The paper presents a review of existing solutions for one of the most popular mobile platforms, Apple’s iOS, and proposes secure development model as a tool to overcome existing threats faced by mobile application developers.
6
Content available remote Model driven architecture for modeling of logical security based on RBAC approach
EN
This paper presents an approach of role-based access control (RBAC) for information systems with the use of MDA (Model Driven Architecture). The main purpose is to join the concepts of MDA approach with the concepts of access control models, in particular with the concepts of access control based on roles and on usage concept. To reach this objectives the appropriate solution was created to model the extended RBAC model and URBAC model with the use of concepts and tools of software engineering, in particular MDA methodology and UML (Unified Modeling Language). The presented approach was developed for role engineering in the aspects of logical security of information systems.
EN
The increased availability of information as a whole became an important problem and threat for its security, especially security of sensitive and confidential information and that is why the necessity to assure the security of such data became undeniable. The developers of applications an information systems put more and more stress on the aspect of their security and safety. Development of information systems has to answer more and more to problems connected to federated data sources and problems of heterogeneous distributed information systems. It is necessary to propose the architecture for secure cooperation of such systems. The paper presents the practical application of concepts of multi-agent systems in domain of logical security of data in distributed information systems. The purpose of presented solution is to support the process management of IT project realization based on the software creation methodologies.
EN
Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.
9
Content available remote Administration of access control in information systems using URBAC model
EN
Since the value of information is constantly growing more and more businesses are in need for information system to aid them with information gathering and processing. The most important issue that arises here is how to ensure safety of this data that may be held on servers, personal computers or PDAs. This is where access control comes in. The main role of access control is to ensure that no unauthorized user will be able to gain access to resources and be able to copy or modify them. The paper deals with the process of access control administration in information systems with the use of usage role-based control approach. The presented process is based on the role engineering concept that includes the creation of security schema of access control divided between two actors - application/system developer and security administrator. They realize their tasks during two main phases that allow to define the complete access control schema for information systems of an organization.
10
Content available remote Access control models for distributed information systems
EN
The appearance of new business models for the organization and enterprise activities in the network and the appearance of new protocols for information exchange provoke that the information is more and more distributed and the traditional access models are insufficient to solve the problems of information control. On the other hand we would like to control the usage and the diffusion of this information. All these new problems are connected with the usage control. The paper presents the different access control strategies in aspects of distributed information systems.
PL
Pojawienie się nowych modeli biznesowych wspomagających działalność organizacji i przedsiębiorstw oraz pojawienie się nowych protokołów, służących do wymiany informacji, spowodowało, że informacja jest coraz bardziej rozproszona i tradycyjne modele kontroli dostępu stały się niewystarczające, by rozwiązać problemy związany z kontrolą dostępu do informacji. Z drugiej strony chcemy kontrolować użycie i wykorzystywanie pozyskanych informacji. Problemy te związane są z kontrolą użycia. Artykuł przedstawia różne strategie kontroli dostępu w aspekcie rozproszonych systemów informatycznych.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.