A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Identification and Prioritization of Cloud based Global Software Development Best Practices
2020
IEEE Access
INDEX TERMS Cloud based global software development (CGSD), Best practices, Fuzzy-AHP ...
The cloud based global software development (CGSD) is the most widely adopted development paradigm in software industry. ...
ACKNOWLEDGMENT "The authors are grateful to the Deanship of Scientific Research, King Saud University for funding through Vice Deanship of Scientific Research Chairs." ...
doi:10.1109/access.2020.3031365
fatcat:zno6rh5zavfubcgo3b4vverlc4
Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based
2020
IEEE Access
To survive in the competitive environment, most organizations have adopted component-based software development strategies in the rapid technology advancement era and the proper utilization of cloud-based ...
However, for a large application with limited resources and frequently change component management activities in the cloud computing environment, component-based system verification is difficult and challenging ...
His research interests include requirements engineering process, global software engineering, agile software development practices, software quality engineering, data mining, and software testing. ...
doi:10.1109/access.2020.3014671
fatcat:hqyd7bpgovc6ni36zzympm7gya
Role of Fuzzy Approach towards Fault Detection for Distributed Components
2021
Computers Materials & Continua
Among other communication, teamwork, and coordination problems in global software development, the detection of faults is seen as the key challenge. ...
Component-based software development is rapidly introducing numerous new paradigms and possibilities to deliver highly customized software in a distributed environment. ...
For software faults detection few practices available based on prioritizing software test cases using prioritization criteria, i.e., requirements dependency, code coverage, history-based, etc. ...
doi:10.32604/cmc.2021.014830
fatcat:iweuklyivndljjzpozv7dgzrw4
Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach
2021
Security and Communication Networks
The AHP technique is executed to prioritize the identified factors and their groups. ...
The taxonomy developed in this study offers a comprehensive structure for dealing with hybrid cloud computing issues, which is essential for the success and advancement of client and vendor organizations ...
practices for these challenges via SLR and questionnaire survey. e final outcome of the research is the development of HCAAM. e proposed model will be developed based on the results drawn from a systematic ...
doi:10.1155/2021/1024139
fatcat:5whjl4nbdvdf3pbexrqsfmfj74
IoT Security Risk Management Strategy Reference Model (IoTSRM2)
2021
Future Internet
The main contribution of this work is the proposed IoTSRM2 which consists of six domains, 16 objectives, and 30 prioritized controls. ...
The proposed IoT security risk management strategy reference model (IoTSRM2) relies on the 25 selected IoT security best practices which are outlined using a proposed taxonomic hierarchy, and on the proposed ...
of these best practices based on the proposed taxonomic hierarchy, and the summarization of these best practices; • The design of a methodology for developing the IoT security risk management strategy ...
doi:10.3390/fi13060148
fatcat:4vxg33ygmfhzfhyorrac6kiop4
Multicriteria Decision Making Taxonomy of Cloud-based Global Software Development Motivators
2020
IEEE Access
INDEX TERMS Cloud-based global software development, motivators, systematic literature review, fuzzy-AHP ...
The software organizations widely consider the cloud based global software development (CGSD) as it offer the quality projects with low cast. ...
Moreover, using the fuzzy-AHP, the identified best practices were prioritized and develop the prioritization based taxonomy [24] . ...
doi:10.1109/access.2020.3030124
fatcat:zamiuyrza5gq5clg6do4zuljgq
Investigating Agile Requirements Engineering Practices in the South African Software Development Market
2020
Journal of Computing and Information Technology
The aim of this research study was to assess Agile RE practices in the South African software development industry and investigate secure Agile RE initiatives towards developing secure products. ...
The study concluded that although Agile Software Development is practiced in the South African software industry, there needs to be stricter adherences to the Agile Manifesto and Agile Security Manifesto ...
Amongst other advantages, cloud based solutions have additional security. Software is stored on a server on the cloud. Credit card information is stored offline. ...
doi:10.20532/cit.2020.1004868
fatcat:l2ye55jwobarbpzigqnz6xbprm
Software Risk Management: Using the Automated Tools
[chapter]
2015
Emerging Trends in Information Systems
The study addresses software risk management in software development area and an approach to analysis, structuring, and evaluating risk with the help of specialized automated tools. ...
In order to manage risks we need to understand the scope and objectives of the software developments and use the appropriate automated risk management tool. ...
Most of the packages today come with the global best practices, future upgrades and support, but they not always show a perfect fit with business needs. ...
doi:10.1007/978-3-319-23929-3_8
fatcat:2t6t7e5qojf7rikx7g3p6dfjau
Analyzing and Evaluating critical challenges and practices for software vendor organizations to secure Big Data on Cloud Computing: An AHP-based Systematic Approach
2021
IEEE Access
The SLR challenges and practices identification will also assist software vendor's companies to secure big data on the cloud computing. ...
Review= 5
Survey=2
8
8
PCSC12.4
Cloud computing offered environment to the development of
agile and also minimize the cost, as cloud base BI can
minimize the overall development costs. ...
Additionally, in future, we want to prioritized and analyzed these security challenges of big data on cloud platform by applying Fuzzy TOPSIS approach to identify the most important and critical challenges ...
doi:10.1109/access.2021.3100287
fatcat:5y74lr46c5ehbc72agpdw7fbcq
Software security requirements management as an emerging cloud computing service
2016
International Journal of Information Management
This paper provides concise methods, techniques, and best practice requirements management guidelines for software security and also discusses an Integrated-Secure SDLC model (IS-SDLC), which will benefit ...
Software Engineering and Information Systems has established techniques, methods and technology over two decades to help achieve cloud service requirements, design, development, and testing. ...
Acknowledgement I would like to thank COMPLEXIS 2016 conference organisers for inviting me as a keynote speaker as this paper is the result of this talk on complex information systems and cloud computing ...
doi:10.1016/j.ijinfomgt.2016.03.008
fatcat:y3mwlaozvjhfli3em332rvu6hu
Cloud Data Security for Goal Driven Global Software Engineering Projects
2015
Procedia Computer Science
The methodology can be applied by any cloud infrastructure organizations with global software awareness. ...
We focus over the requirement for global requirements engineering methodology for assisting activities and clients to choose cloud benefits and reducing risks. ...
Acknowledgements Authors would like to thank all colleagues for serving best ideas and discussions about software engineering and cloud data security. ...
doi:10.1016/j.procs.2015.02.087
fatcat:2npmnf465nhqnfytwrrtyzhadm
System Change Controls: A Prioritization Approach Using Analytic Hierarchy Process
2019
International Journal of Business and Applied Social Science
Alarming facts within the literature trigger analyses and identification of additional methods to assist organizations in protecting their sensitive and critical information. ...
The literature further shows how traditional assessment methods do not necessarily promote an effective evaluation, prioritization, and, therefore, implementation of system change controls in organizations ...
is the most effective. mentioned other best practice frameworks which have also assisted in the identification and selection of SCC. ...
doi:10.33642/ijbass.v5n8p4
fatcat:eczmepnosjfizjvtlgm3zpicfi
Cosine Similarity Based Clustering For Software Testing Using Prioritization
2014
IOSR Journal of Computer Engineering
The difficulty of ensuring the dependability in the growth of the scale of software and software testing in distributed environment a sufficient software testing technique is not possible. ...
Hence in this paper, after generating test cases using functional requirements, dependency structure prioritization technique is used to prioritize the test cases based on the functional structure of dependency ...
Introduction Software engineering is the systematic design and development of software products and maintenance of software. Software testing plays a major role in software engineering. ...
doi:10.9790/0661-16177580
fatcat:gcm3ss27qjhjhijxkxyriecdgm
Cybercrime Regulation through Laws and Strategies: A Glimpse into the Indian Experience
2020
International Journal of Digital Law
Despite these, since cybercrimes are technical as well as dynamic in nature, there is a need to constantly review and revise nation's strategies, which is also one of the objects of this paper. ...
adoption of a new law framework. ...
.
8) To mandate secure application / software development process (from design through retirement) based on global best practices. ...
doi:10.47975/ijdl/1nagarathna
fatcat:7krsbtgec5fx3ju3wexehmchsq
A Fuzzy Based MCDM Methodology for Risk Evaluation of Cyber Security Technologies
[chapter]
2019
Advances in Intelligent Systems and Computing
and alternatives to determine the best cyber security technology. ...
Therefore, the use of technologies developed to provide cyber security is very important. ...
Gartner is a global research and advisory based company centered in America [11] . ...
doi:10.1007/978-3-030-23756-1_123
fatcat:mt7v5jacyjck7fb2dgeub7mp4e
« Previous
Showing results 1 — 15 out of 8,733 results