Download presentation
Presentation is loading. Please wait.
Published byAbigail Hodge Modified over 9 years ago
2
Problem Paramount to the success of your effort stated precisely address an important question advance knowledge
3
How to formulate an important and useful research problem? First need to knowledgeable about your topic of interest –read the literature - most likely it will tell you what needs to be done attend professional conferences seek the advice of experts
4
Possible Avenues for Research Projects Address the suggestions for future research that other researchers have offered replicate a project in a different setting or with a different population apply an existing perspective to a new situation challenge other research findings
6
Towards Security Semantics in Workflow Management Gaby Herrmann, Guenther Pernul University of Essen In the past few years workflow management has become an important topic both, for the research community as well as for the commercial arena. One important topic which has been treated at less detail so far is providing security and integrity in workflow management. The main goal of this paper is to study what kind of security requirements need to be enforced during workflow management and which components of a workflow are effected by appropriate security measures.
7
Firewalls for Security in Wireless Networks U. Murthy Ciber Inc. O. Bukhres, W. Winn Purdue University E. Vanderdez Lucent Technologies Wireless computing is an area of computer science that has experienced much growth during the 1990's. The use of wireless networks allows users to access their home networks while separated from them by significant distances.
8
Due to its convenience and the decreasing cost of the needed hardware and software, wireless computing will continue to experience growth into the next century, both in the number of users and in the amount of data transmitted across wireless networks. Along with the growth of trusted users, there will also be an increase in the number of hackers, or rogue users. Due to financial, business, and privacy concerns, it will become increasingly important for system administrators to protect, from rogue users, hosts connected to wire-less networks.
9
One tool that may be used by system administrators is firewall technology. A firewall allows system administrators to implement strict access controls between the trusted internal network and the non-trusted external world. This paper discusses the firewall and other security tools used to provide security to the wired networks and offers a methodology to protect a wireless network. An Analysis of the proposed methodology and its functionality are also presented. Proceedings of the 31st Hawaii International Conference on System Sciences (HICSS'98), published by the IEEE Computer Society. Copyright (c) 1998 Institute of Electrical and Electronics Engineers, Inc. All rights reserved
10
Using Abuse Case Models for Security Requirements Analysis John McDermott and Chris Fox James Madison University The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge of security engineering. Market forces are driving software practitioners who are not security specialists to develop software that requires security features. When these practitioners develop software solutions without appropriate security-specific processes and models, they sometimes fail to produce effective solutions.
11
We have adapted a proven object-oriented modeling technique, use cases, to capture and analyze security requirements in a simple way. We call the adaptation an abuse case model. Its relationship to other security engineering work products is relatively simple, from a user perspective. Keywords: security, requirements, use case, UML
12
MoJo: A Distance Metric for Software Clusterings Vassilios Tzerpos University of Toronto R.C. Holt University of Waterloo The software clustering problem has attracted much attention recently, since it is an integral part of the process of reverse engineering large software systems. A key problem in this research is the difficulty in comparing different approaches in an objective fashion. In this paper, we present a metric that can be used in evaluating the similarity of two different decompositions of a software system.
13
Our metric calculates a distance between two partitions of the same set of software resources. We begin by introducing the model we use. Consequently, we present a heuristic algorithm that calculates the distance in an efficient fashion. Finally, we discuss some experiments that showcase the performance of the algorithm and the effectiveness of the metric. Keywords: software clustering, reverse engineering, metric
14
Stating Your Research Problem After you have figured out what you are going to focus your effort on, you must state the problem clearly and completely examples of poorly stated plans: –Security on wireless products –Metrics for large systems lack clarity, no reachable goals
15
Stating Your Research Problem Think through the feasibility of the project that the problem applies. –This study proposes to study the computer science programs of secondary schools in ….
16
Stating Your Research Problem Say precisely what you mean –if you were going to study selected schools –representative projects
17
In every research endeavor State the hypotheses and/or research questions delimiting the research defining the terms stating the assumptions
18
Hypotheses Tentative propositions set forth to assist in guiding the investigation of the problem or to provide possible explanation for the observations made
20
Find Your Problem By September the 14th, submit a clear, precise statement of a computer science problem for research. Be sure –problem is stated in a complete, grammatical sentence –is clear how the area of study will be limited or focused –is more than a simple exercise in gathering information, answering a yes/no question or making a simple comparison
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.