A technical review of the software construction knowledge area in the SWEBOK guide

Author(s):  
F. Robert ◽  
A. Abran ◽  
P. Bourque
Author(s):  
W. DAVID HURLEY

The Tailor is a research tool for refining and evaluating a design representation for software systems that have a high degree of textual and graphical interaction. The design representation incorporates both software engineering and knowledge engineering techniques, providing a set of conventions for describing software design information and software construction knowledge. The Tailor demonstrates that the design representation, when embedded in a productivity tool, overcomes limitations of current generation user interface tools. For example, the Tailor has the capability to foresee construction difficulties arising from earlier design decisions. It uses this capability to provide active guidance in producing a software design that avoids problems otherwise overlooked during software specification and design.


1998 ◽  
Vol 27 (2) ◽  
pp. 61-67 ◽  
Author(s):  
M Anbar ◽  
B M Gratt ◽  
D Hong
Keyword(s):  

1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


Sign in / Sign up

Export Citation Format

Share Document