Supporting Authorization Policy Modification in Agile Development of Web Applications

Author(s):  
Steffen Bartsch
Author(s):  
Erika Halme ◽  
Ville Vakkuri ◽  
Joni Kultanen ◽  
Marianna Jantunen ◽  
Kai-Kristian Kemell ◽  
...  

AbstractArtificial Intelligence (AI) systems are increasing in significance within software services. Unfortunately, these systems are not flawless. Their faults, failures and other systemic issues have emphasized the urgency for consideration of ethical standards and practices in AI engineering. Despite the growing number of studies in AI ethics, comparatively little attention has been placed on how ethical issues can be mitigated in software engineering (SE) practice. Currently understanding is lacking regarding the provision of useful tools that can help companies transform high-level ethical guidelines for AI ethics into the actual workflow of developers. In this paper, we explore the idea of using user stories to transform abstract ethical requirements into tangible outcomes in Agile software development. We tested this idea by studying master’s level student projects (15 teams) developing web applications for a real industrial client over the course of five iterations. These projects resulted in 250+ user stories that were analyzed for the purposes of this paper. The teams were divided into two groups: half of the teams worked using the ECCOLA method for AI ethics in SE, while the other half, a control group, was used to compare the effectiveness of ECCOLA. Both teams were tasked with writing user stories to formulate customer needs into system requirements. Based on the data, we discuss the effectiveness of ECCOLA, and Primary Empirical Contributions (PECs) from formulating ethical user stories in Agile development.


2015 ◽  
Vol 6 (3) ◽  
pp. 26-49
Author(s):  
Seiji Munetoh ◽  
Nobukazu Yoshioka

A framework based on a scripting language is commonly used in Web application development, and high development efficiency is often achieved by applying several Agile development techniques. However, the adaptation of security assurance techniques to support Agile development is still underway, particularly from the developer's perspective. The authors have addressed this problem by developing an iterative security testing method that splits the security test target application into two parts on the basis of the code lifecycle, application logic (“active development code”) and framework (“used code”). For the former, detailed security testing is conducted using static analysis since it contains code that is changed during the iterative development process. For the latter, an abstraction library at the command granularity level is created and maintained. The library identifies the behavior of an application from the security assurance standpoint. This separation reduces the amount of code to be statically inspected and provides a mechanism for sharing security issues among application developers using the same Web application framework. Evaluation demonstrated that this method can detect various types of Web application vulnerabilities.


Author(s):  
Xiaocheng Ge ◽  
Richard F. Paige ◽  
Fiona A.C. Polack ◽  
Howard Chivers ◽  
Phillip J. Brooke

2018 ◽  
pp. 49-57
Author(s):  
N. A. Gluzman

In the modern educational space regarding the realities of the information society special importance is attached to issues related to the provision of a high level of informatization of education, which implies teachers’ mastering the necessary competencies and the ability to introduce e-learning resources into educational and training practice. Adobe Flash as one of the platforms for creating web applications and multimedia presentations enjoys greatest popularity with users including teachers. However, in connection with the announcement of discontinuing Adobe Flash support in 2020, the issue of choosing an analog to create web applications and presentations for use in teaching purposes is becoming particularly relevant. The article provides a comprehensive analysis of developing electronic educational resources by teachers using Adobe Flash and HTML5 for teaching math in primary school.


Author(s):  
Maragathavalli P. ◽  
Seshankkumar M. ◽  
Dhivakaran V. ◽  
Ravindran S.

2015 ◽  
Vol 10 (6) ◽  
pp. 558 ◽  
Author(s):  
Kristian Sestak ◽  
Zdenek Havlice

Author(s):  
Lalit Kumar Garg ◽  
◽  
Preeti Rani ◽  
Deepika Goyal ◽  
◽  
...  

Author(s):  
Amit Sharma

Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.


Sign in / Sign up

Export Citation Format

Share Document