Filters








8,733 Hits in 5.5 sec

Identification and Prioritization of Cloud based Global Software Development Best Practices

Muhammad Azeem Akbar, Sajjad Mahmood, Hussain AlSalman, Abdul Razzaq, Abdu Gumaei, Muhammad Tanveer Riaz
2020 IEEE Access  
INDEX TERMS Cloud based global software development (CGSD), Best practices, Fuzzy-AHP  ...  The cloud based global software development (CGSD) is the most widely adopted development paradigm in software industry.  ...  ACKNOWLEDGMENT "The authors are grateful to the Deanship of Scientific Research, King Saud University for funding through Vice Deanship of Scientific Research Chairs."  ... 
doi:10.1109/access.2020.3031365 fatcat:zno6rh5zavfubcgo3b4vverlc4

Towards Pattern-Based Change Verification Framework for Cloud-Enabled Healthcare Component-Based

Sadia Ali, Yaser Hafeez, NZ Jhanjhi, Mamoona Humayun, Muhammad Imran, Anand Nayyar, Saurabh Singh, In-Ho Ra
2020 IEEE Access  
To survive in the competitive environment, most organizations have adopted component-based software development strategies in the rapid technology advancement era and the proper utilization of cloud-based  ...  However, for a large application with limited resources and frequently change component management activities in the cloud computing environment, component-based system verification is difficult and challenging  ...  His research interests include requirements engineering process, global software engineering, agile software development practices, software quality engineering, data mining, and software testing.  ... 
doi:10.1109/access.2020.3014671 fatcat:hqyd7bpgovc6ni36zzympm7gya

Role of Fuzzy Approach towards Fault Detection for Distributed Components

Yaser Hafeez, Sadia Ali, Nz Jhanjhi, Mamoona Humayun, Anand Nayyar, Mehedi Masud
2021 Computers Materials & Continua  
Among other communication, teamwork, and coordination problems in global software development, the detection of faults is seen as the key challenge.  ...  Component-based software development is rapidly introducing numerous new paradigms and possibilities to deliver highly customized software in a distributed environment.  ...  For software faults detection few practices available based on prioritizing software test cases using prioritization criteria, i.e., requirements dependency, code coverage, history-based, etc.  ... 
doi:10.32604/cmc.2021.014830 fatcat:iweuklyivndljjzpozv7dgzrw4

Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach

Siffat Ullah Khan, Habib Ullah Khan, Naeem Ullah, Rafiq Ahmad Khan, Chien Ming Chen
2021 Security and Communication Networks  
The AHP technique is executed to prioritize the identified factors and their groups.  ...  The taxonomy developed in this study offers a comprehensive structure for dealing with hybrid cloud computing issues, which is essential for the success and advancement of client and vendor organizations  ...  practices for these challenges via SLR and questionnaire survey. e final outcome of the research is the development of HCAAM. e proposed model will be developed based on the results drawn from a systematic  ... 
doi:10.1155/2021/1024139 fatcat:5whjl4nbdvdf3pbexrqsfmfj74

IoT Security Risk Management Strategy Reference Model (IoTSRM2)

Traian Mihai Popescu, Alina Madalina Popescu, Gabriela Prostean
2021 Future Internet  
The main contribution of this work is the proposed IoTSRM2 which consists of six domains, 16 objectives, and 30 prioritized controls.  ...  The proposed IoT security risk management strategy reference model (IoTSRM2) relies on the 25 selected IoT security best practices which are outlined using a proposed taxonomic hierarchy, and on the proposed  ...  of these best practices based on the proposed taxonomic hierarchy, and the summarization of these best practices; • The design of a methodology for developing the IoT security risk management strategy  ... 
doi:10.3390/fi13060148 fatcat:4vxg33ygmfhzfhyorrac6kiop4

Multicriteria Decision Making Taxonomy of Cloud-based Global Software Development Motivators

Muhammad Azeem Akbar, Hussain Alsalman, Arif Ali Khan, Sajjad Mahmood, Chandrashekhar Meshram, Abdu Gumaei, Muhammad Tanveer Riaz
2020 IEEE Access  
INDEX TERMS Cloud-based global software development, motivators, systematic literature review, fuzzy-AHP  ...  The software organizations widely consider the cloud based global software development (CGSD) as it offer the quality projects with low cast.  ...  Moreover, using the fuzzy-AHP, the identified best practices were prioritized and develop the prioritization based taxonomy [24] .  ... 
doi:10.1109/access.2020.3030124 fatcat:zamiuyrza5gq5clg6do4zuljgq

Investigating Agile Requirements Engineering Practices in the South African Software Development Market

Nalindren Naicker, Manoj Maharaj
2020 Journal of Computing and Information Technology  
The aim of this research study was to assess Agile RE practices in the South African software development industry and investigate secure Agile RE initiatives towards developing secure products.  ...  The study concluded that although Agile Software Development is practiced in the South African software industry, there needs to be stricter adherences to the Agile Manifesto and Agile Security Manifesto  ...  Amongst other advantages, cloud based solutions have additional security. Software is stored on a server on the cloud. Credit card information is stored offline.  ... 
doi:10.20532/cit.2020.1004868 fatcat:l2ye55jwobarbpzigqnz6xbprm

Software Risk Management: Using the Automated Tools [chapter]

Sergey M. Avdoshin, Elena Y. Pesotskaya
2015 Emerging Trends in Information Systems  
The study addresses software risk management in software development area and an approach to analysis, structuring, and evaluating risk with the help of specialized automated tools.  ...  In order to manage risks we need to understand the scope and objectives of the software developments and use the appropriate automated risk management tool.  ...  Most of the packages today come with the global best practices, future upgrades and support, but they not always show a perfect fit with business needs.  ... 
doi:10.1007/978-3-319-23929-3_8 fatcat:2t6t7e5qojf7rikx7g3p6dfjau

Analyzing and Evaluating critical challenges and practices for software vendor organizations to secure Big Data on Cloud Computing: An AHP-based Systematic Approach

Abdul Wahid Khan, Maseeh Ullah Khan, Javed Ali Khan, Arshad Ahmad, Khalil Khan, Muhammad Zamir, Wonjoon Kim, Muhammad Fazal Ijaz
2021 IEEE Access  
The SLR challenges and practices identification will also assist software vendor's companies to secure big data on the cloud computing.  ...  Review= 5 Survey=2 8 8 PCSC12.4 Cloud computing offered environment to the development of agile and also minimize the cost, as cloud base BI can minimize the overall development costs.  ...  Additionally, in future, we want to prioritized and analyzed these security challenges of big data on cloud platform by applying Fuzzy TOPSIS approach to identify the most important and critical challenges  ... 
doi:10.1109/access.2021.3100287 fatcat:5y74lr46c5ehbc72agpdw7fbcq

Software security requirements management as an emerging cloud computing service

Muthu Ramachandran
2016 International Journal of Information Management  
This paper provides concise methods, techniques, and best practice requirements management guidelines for software security and also discusses an Integrated-Secure SDLC model (IS-SDLC), which will benefit  ...  Software Engineering and Information Systems has established techniques, methods and technology over two decades to help achieve cloud service requirements, design, development, and testing.  ...  Acknowledgement I would like to thank COMPLEXIS 2016 conference organisers for inviting me as a keynote speaker as this paper is the result of this talk on complex information systems and cloud computing  ... 
doi:10.1016/j.ijinfomgt.2016.03.008 fatcat:y3mwlaozvjhfli3em332rvu6hu

Cloud Data Security for Goal Driven Global Software Engineering Projects

Shruti Patil, Roshani Ade
2015 Procedia Computer Science  
The methodology can be applied by any cloud infrastructure organizations with global software awareness.  ...  We focus over the requirement for global requirements engineering methodology for assisting activities and clients to choose cloud benefits and reducing risks.  ...  Acknowledgements Authors would like to thank all colleagues for serving best ideas and discussions about software engineering and cloud data security.  ... 
doi:10.1016/j.procs.2015.02.087 fatcat:2npmnf465nhqnfytwrrtyzhadm

System Change Controls: A Prioritization Approach Using Analytic Hierarchy Process

Angel R. Otero
2019 International Journal of Business and Applied Social Science  
Alarming facts within the literature trigger analyses and identification of additional methods to assist organizations in protecting their sensitive and critical information.  ...  The literature further shows how traditional assessment methods do not necessarily promote an effective evaluation, prioritization, and, therefore, implementation of system change controls in organizations  ...  is the most effective. mentioned other best practice frameworks which have also assisted in the identification and selection of SCC.  ... 
doi:10.33642/ijbass.v5n8p4 fatcat:eczmepnosjfizjvtlgm3zpicfi

Cosine Similarity Based Clustering For Software Testing Using Prioritization

R. Kanimozhi, Prof.J.R Balakrishnan
2014 IOSR Journal of Computer Engineering  
The difficulty of ensuring the dependability in the growth of the scale of software and software testing in distributed environment a sufficient software testing technique is not possible.  ...  Hence in this paper, after generating test cases using functional requirements, dependency structure prioritization technique is used to prioritize the test cases based on the functional structure of dependency  ...  Introduction Software engineering is the systematic design and development of software products and maintenance of software. Software testing plays a major role in software engineering.  ... 
doi:10.9790/0661-16177580 fatcat:gcm3ss27qjhjhijxkxyriecdgm

Cybercrime Regulation through Laws and Strategies: A Glimpse into the Indian Experience

Annappa Nagarathna
2020 International Journal of Digital Law  
Despite these, since cybercrimes are technical as well as dynamic in nature, there is a need to constantly review and revise nation's strategies, which is also one of the objects of this paper.  ...  adoption of a new law framework.  ...  . 8) To mandate secure application / software development process (from design through retirement) based on global best practices.  ... 
doi:10.47975/ijdl/1nagarathna fatcat:7krsbtgec5fx3ju3wexehmchsq

A Fuzzy Based MCDM Methodology for Risk Evaluation of Cyber Security Technologies [chapter]

Melike Erdoğan, Ali Karaşan, İhsan Kaya, Ayşenur Budak, Murat Çolak
2019 Advances in Intelligent Systems and Computing  
and alternatives to determine the best cyber security technology.  ...  Therefore, the use of technologies developed to provide cyber security is very important.  ...  Gartner is a global research and advisory based company centered in America [11] .  ... 
doi:10.1007/978-3-030-23756-1_123 fatcat:mt7v5jacyjck7fb2dgeub7mp4e
« Previous Showing results 1 — 15 out of 8,733 results