Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Poniszewska-Marańda, A." wg kryterium: Autor


Wyświetlanie 1-7 z 7
Tytuł:
Modeling and design of role engineering in development of access control for dynamic information systems
Autorzy:
Poniszewska-Marańda, A.
Powiązania:
https://bibliotekanauki.pl/articles/200307.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
access control of information systems
access control models
role engineering
usage control
Opis:
Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2013, 61, 3; 569-579
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security mechanisms for data access in aspects of tools available in .net framework
Autorzy:
Michalska, A.
Poniszewska-Maranda, A.
Powiązania:
https://bibliotekanauki.pl/articles/94847.pdf
Data publikacji:
2014
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
Security Mechanisms
data security
data access
mechanizmy zabezpieczające
bezpieczeństwo danych
dostęp do danych
Opis:
Software solutions are nowadays commonly used in business. More and more transactions are conducted on-line as well as more and more critical information is being kept on local or remote servers in huge databases. The purpose of presented paper is to analyze and propose the solutions used for the security of sensitive personal data and access to such data provided by the platform chosen for research with respect to the real-life needs of the developers and end-users. The main focus are put on the solutions provided by the .NET platform which next to Java is one of the most commonly used programming environments for both web page and desktop applications.
Źródło:
Information Systems in Management; 2014, 3, 3; 170-181
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Secure development model for mobile applications
Autorzy:
Majchrzycka, A.
Poniszewska-Marańda, A.
Powiązania:
https://bibliotekanauki.pl/articles/200758.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
mobile application development
security of mobile applications
IOS platform
Android platform
rozwój aplikacji mobilnych
bezpieczeństwo aplikacji mobilnych
platforma IOS
platforma Android
Opis:
The development of mobile applications plays an increasingly important role in everyday lives of a visibly growing number of smartphone and tablet users. This trend contributes to changes in corporate management techniques, which now turn towards establishing new standards of data management and extending the functionalities of existing systems to enable the users to benefit from the newest technological advances by creating mobile applications. The paper presents a review of existing solutions for one of the most popular mobile platforms, Apple’s iOS, and proposes secure development model as a tool to overcome existing threats faced by mobile application developers.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2016, 64, 3; 495-503
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mining software repository for improvement of IT project management process
Autorzy:
Guziur, J.
Poniszewska-Marańda, A.
Powiązania:
https://bibliotekanauki.pl/articles/94761.pdf
Data publikacji:
2017
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
software mining
software analytics
MSR tools
Opis:
With the growing number of IT projects and their complexity their deeper analysis became necessary. For this purpose, the historical data on previously completed projects began to collect – it has enabled projects undergo a detailed analysis, which allowed the efficient implementation of projects and allowed in advance to detect the potential problems. Thus a new area of research, Mining Software Repository (MSR), was born. Research in the field of MSR brings very promising results. The increasing importance of research for gaining the tools to support the process of collecting and analyzing the data related to software development is observed. The data from version control systems, bug tracking systems and issue tracking systems is the most popular. This paper presents the existing MSR tools carries out its analysis and describes the weaknesses of each individual solutions.
Źródło:
Information Systems in Management; 2017, 6, 3; 169-180
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Management and control of smart car with the use of mobile applications
Autorzy:
Stępień, K.
Poniszewska-Marańda, A.
Powiązania:
https://bibliotekanauki.pl/articles/95121.pdf
Data publikacji:
2017
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
smart car
mobile application development
iOS platform
Android platform
Opis:
Nowadays electronic world is being introduced into every area of our life. The smart car is a new generation of smartphone, very useful and necessary for many of us to live. That is why a lot of producers try to thrive in this area. Over the last twenty years people experienced a rapid progress in the telephone branch, probably in over next twenty years they would expect the same situation on cars field. The problem presented in the paper concerns the possibility of creating a mobile application for management and control of a smart car.
Źródło:
Information Systems in Management; 2017, 6, 1; 70-81
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security risks and their prevention capabilities in mobile application development
Autorzy:
Michalska, A.
Poniszewska-Maranda, A.
Powiązania:
https://bibliotekanauki.pl/articles/94783.pdf
Data publikacji:
2015
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
mobile application development
security of mobile applications
IOS platform
Android platform
aplikacja mobilna
bezpieczeństwo aplikacji mobilnych
projektowanie aplikacji mobilnych
platforma IOS
platforma Android
Opis:
rapidly growing number of Smartphone users. IT companies try to establish new standards of data management as well as create mobile applications extending the functionalities of existing systems to enable the users to benefit from the newest technological advances. The paper presents a review of the known mobile application vulnerabilities for the two most popular mobile platforms, Apple's iOS and Google's Android, and proposes the secure development model to overcome the existing threats faced by mobile application developers.
Źródło:
Information Systems in Management; 2015, 4, 2; 123-134
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Software test management approach for agile environments
Autorzy:
Pawlak, M.
Poniszewska-Marańda, A.
Powiązania:
https://bibliotekanauki.pl/articles/94863.pdf
Data publikacji:
2018
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Wydawnictwo Szkoły Głównej Gospodarstwa Wiejskiego w Warszawie
Tematy:
management of IT
projects
software testing
management of testing process
Opis:
Software testing is a very broad term that includes a wide variety of topics. They range from technical like testing techniques and measurements, to more organizational like planning and management of testing. Ability to plan, design and create efficient tests is the most critical ability for any good tester. The paper presents Kungfu Testing, which is a testing approach based on advice and best practices advocated by experts in the field of testing. The method is intended to provide a step-by-step instruction of managing testing activities in a project environment. The presented approach was designed to work with and complement the agile development methodologies due to their widespread use and popularity.
Źródło:
Information Systems in Management; 2018, 7, 1; 47-58
2084-5537
2544-1728
Pojawia się w:
Information Systems in Management
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-7 z 7

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies