JACEK KOPCZYNSKI: DEVELOPER YAMEL PERAZA: DEVELOPER MADOUD SADJADI: MENTOR MADOUD SADJADI: PRODUCT OWNER Senior Project Website Version 5 FINAL PRESENTATION.

Slides:



Advertisements
Similar presentations
Windows Deployment Services WDS for Large Scale Enterprises and Small IT Shops Presented By: Ryan Drown Systems Administrator for Krannert.
Advertisements

MVC Nick Lopez Duplication of course material for any commercial purpose without the explicit written permission of the professor is prohibited.
DotNet Market Web Site “EMarket” Milena Natanov Project Supervisor: Victor Kulikov Lab Chief Engineer: Dr. Ilana David Semester spring, – Project.
System Design: Decomposing the System
Architecture, Deployment Diagrams, Web Modeling Elizabeth Bigelow CS-15499C October 6, 2000.
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
AppSec USA 2014 Denver, Colorado CSRF 101 Introduction to Cross-Site Request Forgery.
Application Architectures Vijayan Sugumaran Department of DIS Oakland University.
J2EE Kenneth M. Anderson CSCI Web Technologies October 3, 2001.
1 A Student Guide to Object- Orientated Development Chapter 9 Design.
March Intensive: XSS Exploits
Client/Server Technology Two-Tier Architecture Three-Tier Architecture Josh Antonelli Jenn Lang Joe Schisselbauer Chad Williams.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Requirements Engineering
SQL Server and Application Security for Developers
Requirement Analysis Functional & Non-Functional Requirements Scenarios Use cases: – View Fixtures – Manage Tournament – Register Team – Report Discrepancy.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Advanced Web Forms with Databases Programming Right from the Start with Visual Basic.NET 1/e 13.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
Pemrograman Web MVC Programming and Design Pattern in PHP 5.
SEA Side Software Engineering Annotations Annotation 13: Use Cases Professor Sara Stoecklin Director of Software Engineering- Panama City
By Wayne Sibley Information Engineering Technology University of Cincinnati College of Applied Science.
Private Cloud Service Delivery and Automation with Microsoft System Center 2012 Sean Christensen Senior Technical Product Marketing Manager Microsoft Corporation.
2-Tier,3-Tier datawarehouse Submitted by Manisha Dubey & Akanksha Agrawal.
The attacks ● XSS – type 1: non-persistent – type 2: persistent – Advanced: other keywords (, prompt()) or other technologies such as Flash.
> > > > Prepared for COP-4991 Component-Based Software Development Professor: S. Masoud Sadjadi COP 4991 – Fall 2006 – Term Project Presentation.
SEARCH OPTIMIZER By JAGANI RAJ 7 th /I.T. Guided By: Mrs. Darshana H. Patel.
Senior Project, 2015, Spring Senior Project Web Site –Version 5 Student: Jacek Kopczynski, Florida International University Mentor: Masoud Sadjadi, Florida.
SQL INJECTIONS Presented By: Eloy Viteri. What is SQL Injection An SQL injection attack is executed when a web page allows users to enter text into a.
Web Applications Testing By Jamie Rougvie Supported by.
Building Secure Web Applications With ASP.Net MVC.
Web system security issues: A developer's perspective Morrison, P. Jason 9 December 2004 BAD Information Security Web system security issues:
Kia Manoochehri.  Background  Threat Classification ◦ Traditional Threats ◦ Availability of cloud services ◦ Third-Party Control  The “Notorious Nine”
1 Robust Defenses for Cross-Site Request Forgery Adam Barth, Collin Jackson, John C. Mitchell Stanford University 15th ACM CCS.
Sketchmate: A Computer-Aided Sketching and Simulation Tool for Teaching Graph Algorithms Dissertation Proposal Kristy VanHornweder April 11, 2011.
Customer Identification system based on Smart Card for PDA shops.
Model View Controller Architecture of Java Web Applications Dr. M V S Peri Sastry, Ph.D.[BITS-Pilani]
Web Application Vulnerabilities ECE 4112 Internetwork Security, Spring 2005 Chris Kelly Chris Lewis April 28, 2005 ECE 4112 Internetwork Security, Spring.
Lecture 18: Object-Oriented Design
UML Package Diagrams. Package Diagrams UML Package Diagrams are often used to show the contents of components, which are often packages in the Java sense.
COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 9 1COMP9321, 15s2, Week.
Senior Project, 2015, Spring Senior Project Website –Version 5 Student: Yamel Peraza, Florida International University Mentor: Masoud Sadjadi, Florida.
The basics of knowing the difference CLIENT VS. SERVER.
Jemerson Pedernal IT 2.1 FUNDAMENTALS OF DATABASE APPLICATIONS by PEDERNAL, JEMERSON G. [BS-Computer Science] Palawan State University Computer Network.
Integrating FRs and NFRs: A Use Case and Goal Driven Approach Sam Supakkul Network Surveillance Systems MCI Lawrence Chung Dept. of.
Security Khaled Al-Sham’aa. What Is Security? Security is a measurement, not a characteristic. Security must be balanced with expense. Security must be.
Autism-Genetic Database autism-genetic-db.net IT490/IT492: Capstone Project Department of Electrical Engineering and Computer Science Client: Dr. Zohreh.
System Architecture CS 560. Project Design The requirements describe the function of a system as seen by the client. The software team must design a system.
SECURE DEVELOPMENT. SEI CERT TOP 10 SECURE CODING PRACTICES Validate input Use strict compiler settings and resolve warnings Architect and design for.
Top.Not.59 Group: Trần Hùng Team Leader Mai Thị Thu Hà Vũ Hồng Quân Lê Thị Hoài Thu Vũ Đình Thắng Supervisor: Mr. Nguy Ễ n T Ấ t Trung.
World Wide Web policy.
API Security Auditing Be Aware,Be Safe
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
What is REST API ? A REST (Representational State Transfer) Server simply provides access to resources and the REST client accesses and presents the.
Yii - For the Future - Gen Web Development Platform
Group 7 Eduardo Peña Vanessa Ramirez Eduardo Tibau
Final Presentation CIS 4911 Senior Project
Mentors: Christine Lisetti and Ugan Yasavur
Web-deployment of a Data Visualization Framework Using AJAX Technology
Project: Virtual Job Fair Students: Justin Korah, Diego Perez, Andres Gonzalez, Enmanuel Corvo, Tomer Doar Mentor: Masoud Sadjadi, Juan Caraballo Project.
Habitats and Interactions
Tiers vs. Layers.
Proposal Presentation
* Introduction to Cloud computing * Introduction to OpenStack * OpenStack Design & Architecture * Demonstration of OpenStack Cloud.
SENIOR PROJECT WEBSITE
Graduation Project #1 University Internet Student Registration System
CSCE156: Introduction to Computer Science II
System Analysis and Design:
Presentation transcript:

JACEK KOPCZYNSKI: DEVELOPER YAMEL PERAZA: DEVELOPER MADOUD SADJADI: MENTOR MADOUD SADJADI: PRODUCT OWNER Senior Project Website Version 5 FINAL PRESENTATION CIS 4911 Senior Project School of Computing and Information Sciences Florida International University April 1 st, 2015

Problem Definition SPWS does not support the request of Virtual machines  Current method of requesting virtual machines is: o Time consuming o Error prone  Proposed system will extend the usability of the SPWS o Students can customize their virtual machines o Head professor can manage virtual machine requests SPWS does not have functionality for:  Including students with incomplete grade  Forgotten password  Easy environment setup for future versions of the project Senior Project Website V5 2

Project Management Senior Project Website V5 3

User stories Senior Project Website V5 4

User stories Senior Project Website V5 5

Use Case Diagram Senior Project Website V5 6

Sequence Diagrams Senior Project Website V5 7

8

System Design – System Decomposition Senior Project Website V5 9 Primary Architecture: MVC  Model: Maintains domain knowledge  View: Displays information to user.  Controller: Manages sequence of interactions with users Secondary Architecture: Three-Tier  Similar to MVC with “presentation tier” (view), “domain logic tier” (controller), and “data-storage tier” (model)  But presentation and data-storage tiers do not interact its explicitly presentation to/from domain logic to/from data storage NOTE: No change from V4

System Design - System Deployment Senior Project Website V5 10 Deployment Diagram (same as V4)

System Design – Persistent Data Design Senior Project Website V5 11 ER Diagram (did change from V4)

Security & Privacy Senior Project Website V5 12 No changes with respect to SPWSv.4 SQL Injection URI Security Cross-site scripting (XSS) Cross-site request forgery (CSRF) Session Encryption

Detailed Design – Minimal Class Diagram Senior Project Website V5 13

Test Case – Sunny Day Senior Project Website V5 14

Test Case – Rainy Day Senior Project Website V4 15