Wednesday, May 6, 2020
Safety Critical Software Engineer Process-Myassignmenthelp.Com
Question: Discuss About The Safety Critical Software Engineer Process? Answer: Introduction Powering businesses with latest online technologies is the future of many businesses in these technological times. Almost all the manual business paperwork has been taken over by technology. BuyIt is an online catalog where users are able to make product purchases or sell products as well. This online software management system will allow a buyer to give their destination address and they are prompted to make payments through their credit cards online (Singh, Sharma Saxena, 2016). After this, the item bought will be shipped to the desired location of the buyer. This robust system, therefore, needs to have a good foundation with regard to its security and risk management. BuyIts main goal is to increase business revenue collected from the internet and to bring together the buyer and seller on a platform which keeps user integrity and secure payment gateways. We have designed Z schemas representing various operations of the BuyIt software in this paper (Khan Jamshed, 2016). Z schemas Z schemas have been created in order to easily illustrate all the input and output variables used by ButIt to accomplish all of its non-functional requirements (Singh, Sharma Saxena, 2016). I order to complete all the actions, an array of functions were created. They are Register user, login, and user reputation, upload new products, search product and punish user. The Z schema below best illustrates all these functions. Distinct parameters have been utilized by the schemas developed below. These parameters have been noted to be the basic elements that are required for the smooth working of the BuyIt system. Password: This parameter represents the security passcode which every user will give as input so that they are authorized to use the BuyIt system. Product: This represents the name of item that is available on the BuyIt portal and can be viewed by other potential buyers. Email: this is a unique identification parameter that needs to be used during registration. A user will confirm their email before a successful sign up. Reputation: this is a natural integer that represents the score level of a user. It will be updated by the correspondent user every time a successful purchase is done. Condition: This is the state of the product Cost range: this is the range of the prices of items. Registration The register user schema above shows the user inputs of email address and password. These values will later be used for signing into the system. There are two pre-conditions in this case. The email address and username provided by a user should not be known or not in the database already. That is em? known and email known. The email and password will later be associated together for that user and saved. i.e. passw = UserPassword {em Passw?} Sign In Access control is a crucial component for all award winning software systems. This aims at protecting he confidentiality and integrity of user information. BuyIt has implemented this by first ensuring that a user is authenticated before accessing its products and services. The user input i.e. email and password are encrypted using the latest encryption technologies in order to ensure that data is always safe even when cybercriminals haze made access to the primary database of the system (Yang Jia, 2014). The password furthermore must be a strong password. A strong password is characterized to be a combination of lowercase and uppercase letters, numbers, characters, and symbols.The user must provide his email and password during the signing in (Em? :EmailAddress Upload Product Before a product is visible to potential buyers for purchase, it must be uploaded to the BuyIt database. This schema has some preconditions which are: the product name can be known or not known by the system, the cost of the product must not be left empty (cost? = notnull), and the product specification also must be made (spec? = notnull). Product Search In this schema of Product search, the predicates illustrate that there is an index i at which the products array contains an input product? And the outputs cond! And spec! Are corresponding elements of the array products. So that this happens, the product? Input needs to appear at some place in the array products. This will become the pre-condition of the search operation. Purchase When purchasing an item, BuyIt provides for a user to check out and pay using their credit card. Before payment, BuyIt will sum up the cost of the item (s) together with the cost of shipping in order to give how much the buyer needs to pay. When making the payment, several preconditions apply. The users credit card balance is not below the total cost of item bought and the shipping location and quantity of items must be provided. Reputation A good management system needs to keep track on its users and punish users who go against the policies set for the smooth running of the business (Madhan, Kalaiselvi Donald, 2017). This strategy will greatly help reduce non-existent products. In that, any user that uploads a product with description and all required options and then when a buyer wants the product, the product wont be delivered because it did not exist in the first place. In such a situation, the purchaser will give a reputation score of less than one and the user will be blocked from accessing the system and their non-existent products will be removed from the BuyIt portal. The user reputation must be between 0 and 5. The previous reputation is averaged with any new reputation score awarded to a user Punish User When the reputation of a user falls below zero, they are not allowed to continue using BuyIt services. The account is thus blocked this is a punishment so as to ensure that both the buyer and seller successfully provide great products and keenly select the products they need respectively (Fifield, Lan, Hynes, Wegmann, Paxson, 2015). This, in the end, guarantees efficient and professional transactions are achieved through the BuyIt portal. References Fifield, D., Lan, C., Hynes, R., Wegmann, P., Paxson, V. (2015). Blocking-resistant communication through domain fronting.Proceedings on Privacy Enhancing Technologies,2015(2), 46-64. Khan, S. A., Jamshed, H. (2016). Analysis of formal methods for specification of e-Commerce applications.Mehran University Research Journal Of Engineering Technology,35(1), 19. Madhan, V., Kalaiselvi, V. K. G., Donald, J. P. (2017, February). Tool development for formalizing the requirement for the safety critical software engineering process. InComputing and Communications Technologies (ICCCT), 2017 2nd International Conference on(pp. 161-164). IEEE. Singh, M., Sharma, A. K., Saxena, R. (2016). An UML+ Z framework for validating and verifying the Static aspect of Safety Critical System.Procedia Computer Science,85, 352-361. Tan, W. K., Teo, H. H. (2015, August). ProductpediaA Collaborative Electronic Product Catalog for Ecommerce 3.0. InInternational Conference on HCI in Business(pp. 370-381). Springer, Cham. Yang, K., Jia, X. (2014). DAC-MACS: Effective data access control for multi-authority cloud storage systems. InSecurity for Cloud Storage Systems(pp. 59-83). Springer, New York, NY.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.