Εμφάνιση απλής εγγραφής

dc.contributor.advisorΚάτσικας, Σωκράτης
dc.contributor.authorΤσίτσα, Ιουλία
dc.date.accessioned2015-07-22T12:34:01Z
dc.date.available2015-07-22T12:34:01Z
dc.date.issued2014-11
dc.identifier.urihttps://dione.lib.unipi.gr/xmlui/handle/unipi/6916
dc.format.extent47el
dc.language.isoenel
dc.publisherΠανεπιστήμιο Πειραιώςel
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Διεθνές*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectSoftware engineeringel
dc.subjectComputer software -- Reliabilityel
dc.subjectComputer software -- Quality controlel
dc.subjectComputer software -- Developmentel
dc.titleRequirements capturing and software development methodologies for trustworthy systemsel
dc.typeMaster Thesisel
dc.contributor.departmentΣχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Ψηφιακών Συστημάτωνel
dc.identifier.call005 ΤΣΙel
dc.description.abstractENIn this Master's thesis, the concept of information systems trustworthiness will be covered, in terms of describing existing methodologies for collecting and documenting security requirements as well as describing how existing methodologies support the delivery of trustworthy systems. Moreover, this essay will employ a case study, in order to enforce the essay's outcomes on how to achieve trustworthy software. Trustworthiness is a characteristic that can be applied to any system that satisfies the desired level of trust by not failing. The systems that should possess such a property are mainly systems that manage sensitive records, critical infrastructure, etc. The capturing of a system's requirements is the process of discovering and identifying the system's stakeholders and their needs. A system's requirements are the features and qualities that a system should possess, and are extracted from the system's stakeholders (i.e. owners, users). Therefore, the identification of security requirements is of crucial importance for the achievement of the desired security goals, namely trustworthiness. With respect to security requirements, in order for a system to ensure that its security specifications are satisfied, security concerns must be taken into consideration in every phase of the software engineering lifecycle; namely, from requirements engineering to design, implementation, testing, and deployment. In order to increase users' trust in the systems they use, software defects must be reduced through. Following a systematic development methodology, during the software development process, the risk of not achieving the acceptable result, is reduced, if not eliminated, since software development methodologies impose a disciplined process upon software development.el
dc.contributor.masterΤεχνοοικονομική Διοίκηση και Ασφάλεια Ψηφιακών Συστημάτωνel


Αρχεία σε αυτό το τεκμήριο

Thumbnail

Αυτό το τεκμήριο εμφανίζεται στις ακόλουθες συλλογές

Εμφάνιση απλής εγγραφής

Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές
Εκτός από όπου διευκρινίζεται διαφορετικά, το τεκμήριο διανέμεται με την ακόλουθη άδεια:
Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές

Βιβλιοθήκη Πανεπιστημίου Πειραιώς
Επικοινωνήστε μαζί μας
Στείλτε μας τα σχόλιά σας
Created by ELiDOC
Η δημιουργία κι ο εμπλουτισμός του Ιδρυματικού Αποθετηρίου "Διώνη", έγιναν στο πλαίσιο του Έργου «Υπηρεσία Ιδρυματικού Αποθετηρίου και Ψηφιακής Βιβλιοθήκης» της πράξης «Ψηφιακές υπηρεσίες ανοιχτής πρόσβασης της βιβλιοθήκης του Πανεπιστημίου Πειραιώς»