Search
Now showing items 1-7 of 7
Specifying Security Goals of Component Based Systems: An End-User Perspective
(
IEEE
, 2008 , Conference Paper)
This paper treats security from a software engineering point of view. Security issues of software components are usually handled at the two levels of development abstractions: by the security experts during the component ...
Assessing Quality of Web Based Systems
(
IEEE
, 2008 , Conference Paper)
This paper proposes an assessment model for Web-based systems in terms of non-functional properties of the system. The proposed model consists of two stages: (i) deriving quality metrics using goal-question-metric (GQM) ...
Empowering users of cloud computing on data confidentiality
(
IEEE
, 2014 , Conference Paper)
Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ...
Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Maintainability and easy-to-customisation are some quality properties that most application software in software-as-a-service (SaaS) should posses. These quality attributes are the pre requisite for most application software ...
Data confidentiality in cloud-based pervasive system
(
Association for Computing Machinery
, 2017 , Conference Paper)
Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
Using block cipher for confidentiality of images in cloud-based systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...
Security oriented service composition: A framework
(
IEEE
, 2012 , Conference Paper)
This paper argues that in order to address the challenges of security compatibility checking between the client's software and the service software in a service oriented software environment, the followings have to be ...