OVERVIEW TEAM ARCHITECTURE THE PROCESS Top Level SADT Diagram

Slides:



Advertisements
Similar presentations
Synergy Distributed Meeting Scheduler(SDMS) TEAM:4 Rutvij Mehta Shruti Mehta Shveta Mupparapu Meghna Swetha Raguraman Rakesh Sanapala Venkata Jaganadh.
Advertisements

automated single login access to Novell storage resources
Implementing Tableau Server in an Enterprise Environment
Instant Messenger Security with a focus on implementing security policies in corporate IM services Kaushal S Chandrashekar CS 691 Dr. Edward Chow UCCS.
Using the Self Service BMC Helpdesk
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
Securing the Broker Pattern Patrick Morrison 12/08/2005.
درس مهندسی نیازمندی ها استاد دکتر عبداله زاده دانشجو خیرالنسا مرچانت Dealing with NFR : Three Experimental Studies of a Process-Oriented Approach.
Amirkabir University of Technology, Computer Engineering Faculty, Intelligent Systems Laboratory,Requirements Engineering Course, Dr. Abdollahzadeh 1 Dealing.
IS 4420 Database Fundamentals Chapter 12: Data and Database Administration Leon Chen.
Dealing with NFRs Vahid Jalali Amirkabir university of technology, Department of computer engineering and information technology, Intelligent systems laboratory,
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
1 Enabling Secure Internet Access with ISA Server.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Module 12: Designing an AD LDS Implementation. AD LDS Usage AD LDS is most commonly used as a solution to the following requirements: Providing an LDAP-based.
Dineshwari Byrappa Nagraj Rashi Gupta Shreya Modi Swati Satija Magesh Panchanathan.
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
SDMS Project Phase Ⅰ Duk-Jin Kim Tu Peng Yan Shi.
Module 7: Fundamentals of Administering Windows Server 2008.
8.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 8: Planning.
Key Takeaway Points A use case is a business process; it begins with an actor, ends with the actor, and accomplishes a business task for the actor. Use.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Synergy™ Distributed Meeting Scheduler Organize meetings with SDMS SynergySoft, Inc. presents:
1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt.
Synergy Meeting Scheduler System T-squared, S-cubed TJ Andrews Thriveni Movva Sadequa Azam Sama Malik Scott Denson.
Team Think For You. Outline  Introduction  Process  Requirements Engineering  Architecture  Detailed Design  Testing  Demo  Extensibility  Conclusions.
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
1 Final Status Report Sonali PagadeNibha Dhagat David Ziman Reginald Bradshaw II Sebastian Schagerer Janet Xu Phan Marvel Electronics & Home Entertainment.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
User Management. Basics SDMS shall maintain a database of all users. SDMS shall maintain a database of all users. SDMS shall not limit the number of registered.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 The SqlConnection Object ADO.NET - Lesson 02  Training time: 10 minutes 
Meeting Scheduler Carl Fernandes Mahbubur Rahman Haque Muaz Jamshed Rahul Kotian Ramakrishnan Jayavelu Sujith John Zachariah Interim Presentation -2 on.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
 SAP AG 2007, SAP CSUN 2007 Conference Presentation / 1 Presented by Team “Call of Duty” 29 th April 2010 CS 6361, University of Texas At Dallas.
Integrating FRs and NFRs: A Use Case and Goal Driven Approach Presented by Chin-Yi Tsai.
CS6361 Project, Part 2 Fall 2006 The Design Firm of Bouchier, Fischer, Herschbach, & Nina.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
SynergySoft™ Distributed Meeting Scheduler Requirements Review Yasaman Haghpanah Ravindra Rudraraju Sowjanya Sakruti Jim Whitaker.
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
Pass Microsoft Installing and Configuring Windows Server 2012 exam in just 24 HOURS! 100% REAL EXAM QUESTIONS ANSWERS Microsoft Installing.
15 Copyright © Oracle Corporation, All rights reserved. Managing Users.
Synergy Distributed Meeting Scheduling System Francisco Puente Arundhati Solapurkar Jung-Chi Lin.
Building Enterprise Applications Using Visual Studio®
Data and database administration
Master thesis: Automatic Extraction of Design Decision Relationships from a Task Management System Kick-Off Matthias Ruppel, 8th of May 2017, Munich.
Chapter 4 – Requirements Engineering
Secure Software Confidentiality Integrity Data Security Authentication
Timeline.
A Wireless LAN Security Protocol
Smart Tendering System
Module 8: Securing Network Traffic by Using IPSec and Certificates
THE STEPS TO MANAGE THE GRID
Web-based Console for Controlling a Wireless Sensor Network (WeConWSN)
County HIPAA Review All Rights Reserved 2002.
Analysis models and design models
SynergySoft™ Distributed Meeting Scheduler
Enterprise Requirements Literal
* Introduction to Cloud computing * Introduction to OpenStack * OpenStack Design & Architecture * Demonstration of OpenStack Cloud.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Session 1 – Introduction to Information Security
Duk-Jin Kim Tu Peng Yan Shi
Presentation transcript:

OVERVIEW TEAM ARCHITECTURE THE PROCESS Top Level SADT Diagram Detailed Diagram Activity Diagram THE PRODUCT Entity class diagram UML diagrams Softgoal Interdependency Graph FOR NFR ADDITIONAL REQUIREMENTS Security Issues

TEAM ARCHITECTURE Team Members Roles Played Primary Concern Abhishek Project Manager UML Specification Nikita Requirements Engineer Prototype development Potential End user Nikita Requirement engineer Process specification Smarak Developer Implementation Anurag Requirements Engineer Process specification Manish Domain Expert Testing Deployment

PROCESS SPECIFICATION Top Level Diagram C1: SIG guidelines C2: UML guidelines C3: SADT guidelines C4: Req. specifications Requirements processing Initial document and requirement elicitation Requirements Engineer Process Specification A0 C1 C2 C3 C4 Software requirement specification

PRODUCT SPECIFICATION Top Level Diagram

PRODUCT SPECIFICATION Detailed Design Diagram

USE CASE DIAGRAM

ENTITY CLASS DIAGRAM

Sequence Diagram (plan a meeting )

CLASS DIAGRAM

CONFLICT RESOLUTION 1. Extend date range

CLASS DIAGRAM

2.Add preference range

CLASS DIAGRAM

3.Remove exclusion range

CLASS DIAGRAM

SIG FOR PROCESS NON FUNCTIONAL REQUIREMENT Performance Good time performance Good space performance High throughput Low main memory usage Low secondary memory usage Low response Time Low CPU time Low input/output act Compressed Format Low system CPU time Low user CPU time Indexing Multi level Single level indexing ++ Uncompressed Format -- + SIG FOR PROCESS NON FUNCTIONAL REQUIREMENT Security Confidentiality Integrity Availability Accuracy Completeness Single Userid and password Authorized access Identification Authentication Security questions User friendly - ++ + Rules

SIG FOR PRODUCT NON FUNCTIONAL REQUIREMENT Performance Good time performance Good space performance High throughput Low main memory usage Low secondary memory usage Low response Time Low CPU time Low input/output act Compressed Format Low system CPU time Low user CPU time Indexing Multi level Single level indexing ++ Uncompressed Format -- + SDMS Managinteract Plan meeting Manage interaction Replan meeting Resolve conflict - SIG FOR PRODUCT NON FUNCTIONAL REQUIREMENT

SIG FOR PRODUCT NON FUNCTIONAL REQUIREMENT Security Confidentiality Integrity Availability Accuracy Completeness Single Userid and password Authorized access Identification Authentication Security questions - ++ + Rules SDMS Login Resolve Conflict Replan meeting Ease of use PLAN SIG FOR PRODUCT NON FUNCTIONAL REQUIREMENT

Security a prime concern.. Security and privacy provided by SDMS WE understands how importance of data . SDMS provides application and data security, based on proven standards that support internal security policies across your organization. Provides a secured mechanism so that the users reserving the room are authenticated Integrated Windows authentication always encrypts the client's password, which provides excellent security. Provision is made to designate the availability of select conference rooms for certain users only. The product also helps to ensure the security of audio and Web conferencing through control features including: • Secure account authentication (username and conference code login) • Session management security (session ID and configurable time-out parameters) • Entry and exit tones • Conference lock and automatic termination upon moderator exit from the Audio Console

QUESTIONS ??????

THANKS Nikita Patel Abhishek Goyal Smarak Bhuyan Manish Bansal Anurag Mahajan