A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Prasanna Balaji, N.
- Software Testing Scenario
Authors
1 Dept of IT, Gurunank Engineering College, an NBA Accredited College Located in Ranga Reddy Dist, Hyderabad, Iibrahimpatnam, IN
2 Department of Information Technology in Gurunank Engineering College, an NBA Accredited College Located in Ranga Reddy Dist, Hyderabad, Iibrahimpatnam, IN
3 Gurunank Engineering College, an NBA Accredited College Located in Ranga Reddy Dist, Hyderabad, Ibrahimpatnam, IN
Source
Software Engineering, Vol 1, No 7 (2009), Pagination: 207-214Abstract
Software testing is any activity aimed at evaluating an attribute and capability of a program. System and determining that it meets its required results. Although crucial to software quality and widely deployed by programmers and testers, software testing still remains an art, due to limited understanding of the principles of software. Testing and test designs parts of quality assurance should also focus on bug prevention. Bug prevention is testing fist goal. A prevented bug is better than a detected and corrected bug because if the bug is prevented, there's no code to correct. The difficulty in software testing stems from the complexity of software: we can not completely test a program with moderate complexity. Testing is more than just debugging. The purpose of testing can be quality assurance, verification and validation, or reliability estimation. Testing can be used as a generic metric as well. Correctness testing and reliability testing are two major areas of testing. Software testing is a trade-off between budget, time and quality.Keywords
Taxonomy, Correctness Testing, Black-Boxtesting, White-Boxtesting, Performance Testing, Reliability Testing, Security Testing, Testing Automation.- Contemporary Vulnerability Evaluation of Web Servers
Authors
1 Kakatia University, Warangal, IN
2 Department of Information Technology in Gurunanak Engineering College, Ranga Reddy Dist., Ibrahimpatnam, Hyderabad, IN
3 Guru Nanak Engineering College, Ibrahimpatnam, Hyderabad, Andhra Pradesh, IN
Source
Networking and Communication Engineering, Vol 3, No 12 (2011), Pagination: 819-825Abstract
In this era of modern business web world, the use of web applications is increased beyond common comprehension. Every field throughout the world depends on it, but concurrently faces the risk of being copied. Many ways came to light to conquer the security problems even then new attacks see light every day. This is definitely a non-stop cycle, so keeping pace with identifying possible vulnerabilities is the only way out to handle the web applications attack-free. Here Pen testing plays a crucial role to keep pace with spotting possible potential threats. My paper asserts the importance of this Pen testing, vulnerabilities originated in recent times and their solutions. Web servers and web applications play a pivotal role in global market today. Its spread is limitless, with this limitless spread, also developed the problems of security proportionately. So time to time, security alerts became the need of the hour. Now my paper focuses on these possible contemporary vulnerabilities, their explorations, and fitting solutions. This definitely will contribute to expect even very sensitive and unknown vulnerabilities and thereby give way to fix them thoroughly. This is surely the demand of the hour.Keywords
Attack, Exploit, Mitigation, Vulnerability.- Role of Smart Phones in Cloud Computing
Authors
1 Kakatia University, Warangal, IN
2 Department of Information Technology in Gurunanak Engineering College, in Ranga Reddy Dist., Ibrahimpatnam, Hyderabad, IN
3 Annamacharya Institute of Technology Hyderabad, IN
Source
Networking and Communication Engineering, Vol 3, No 12 (2011), Pagination: 826-829Abstract
This paper explains about the role of smart phones in cloud computing and how they are likely to replace the role of desktop computers to some extent. This paper explains, starting with introduction of complexity of design and development of an Operating System and no. of responsibilities performed by the OS, how changes to the OS over the time made cut short the responsibilities and is fit into small devices i.e. Mobile OS. The always connectivity of these devices to Internet changed the every action of human life.Keywords
Operating System, Mobile OS.- The Network Security Assessment Instrument to Reduce Software Security Risk
Authors
1 Dept of IT., Gurunank Engineering College, an NBA Accredited College Located in Ranga Reddy Dist, Hyderabad, Ibrahimpatnam, IN
2 Department of Information Technology, JNTU University, Gnec, Hyderabad, Andhra Pradesh, 501510, IN
Source
Networking and Communication Engineering, Vol 1, No 7 (2009), Pagination: 392-399Abstract
The network security assessment instrument is a comprehensive set of tools that can be used individually or collectively to ensure the security of network aware software applications and systems. Using the various tools collectively provide a distinct advantage for assuring the security of software and systems.Each tool’s resulting output provides feedback into the other tools.Thus more comprehensive assessment results are attained through the leverage each tool provides to the other when the are employed in concert. This project presents a portion of a research project on the generation of the network security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles.
The portion, the flexible modeling Framework (FMF), has promise in the areas of network security as well as other critical areas such as system safety.
Software Security is a major concern due to the risk to both controlled and no controlled systems from potential lost or corrupted data, theft of information, and unavailability of systems, especially mission critical systems,
This research examines formal verification of IT security of
network aware software and systems through the creation of a security assessment instrument for the software development and maintenance life cycle.
The network security assessment instrument is composed of 5 parts:
1. A Vulnerability Matrix
2. Additional Security Assessment Tools (SATs)
3. A Property Based Testing (PBT) Tool, and
4. A Flexible Modeling Framework (FMF)
5. A Software Security Checklist
The vulnerability contains vulnerability descriptions and the code used to exploit them.
The SATs are a collection of tools available to test for potential weaknesses of software code. The PBT tool performs formal verification of properties at the code level. Like the PBT tool, the FMF formally verifies properties over the system.
The FMF performs this action at the abstract level when code may or may not yet exist.
The SSC will provide software code developers with another instrument for writing secure code for network aware applications
Keywords
Additional Security Assessment Tools (SATs), Flexible Modeling Framework (FMF), Property Based Testing (PBT) Tool, Software Security Checklist (SSC), and Vulnerability Matrix.- Crawling the Web at Desktop Balance Inspection
Authors
1 Dept. of IT, Gurunank Engineering College, NBA Accredited College, Ibrahimpatnam, Hyderabad, Ranga Reddy Dist., IN
2 Department of Information Technology, JNTU University, Gnec, Hyderabad-501510, Andhra Pradesh, IN
Source
Data Mining and Knowledge Engineering, Vol 1, No 7 (2009), Pagination: 359-363Abstract
Crawler is a hypertext resource discovery system whose goal is to selectively seek out pages that are relevant to a pre-defined set of topics. The inherent characteristics of focused crawling, personalization and low resource needs, naturally lends to its usage by individuals. Current focused crawlers depend on a classifier that scores each crawled document with respect to a predefined set of topics. In real applications. Today finding information on the web is an arduous task that will only get worse with the exponential increase of content. To deal with this issue, search engines, web sites providing users with the ability to query for web pages of interest, have become the utility of choice. A simple search against any given engine can yield thousands of results. This presents a huge problem as one could spend a majority of her time just paging through the results. More often than not, one must visit the referenced page to see if the result is actually what she was looking for. This can be attributed to two important facts. On the one hand, the result page's link metadata, i. e. the description of the page returned by the search engine, is not very descriptive. On the other hand, the result page itself is not guaranteed to be what the user is looking for. Once a page is found that matches the user expectations, the search engine moves out of the picture and it is up to the user to continue mining the needed information. This can be a cumbersome task as pages on the web have a plethora of links and an abundance of content. Having to filter through thousands of references is not a very rewarding search process considering that there is no way to be certain that the search will be complete, or always yield the web page the user was originally interested in. These problems must be addressed in order to increase the effectiveness of search engines. We believe that the aforementioned problems could be addressed if the number of links the user had to visit in order to find the desired web page could be reduced. First, we define the following term which will be used throughout the rest of the paper and in our assertion below. A concept is one overarching idea or topic present in a web page. Put simply, our assertion is: if the concepts of underlying web page results being searched can be presented to the user automatically then the amount of links the user will need to visit to find her desired result will be lessened. Essentially this means automatically discovering the set of concepts that describe a web page. This describes and evaluates a method for automatically extracting the concepts from web pages returned via heterogeneous search engines including Google, MSN Search, Yahoo Search, AltaVista Search and Ask Jeeves Search. Along with regular concepts, our method also extracts complex concepts.Keywords
Crawling, Crawlers, Focused Crawler, Query, Track, User Queries.- Employee Performance Identification Portal
Authors
1 Dept. of IT., Gurunank Engineering College, An NBA Accredited College, Ibrahimpatnam, Hyderabad, Ranga Reddy Dist, IN
2 Department of Information Technology, JNTU University, Gnec, Hyderabad-501510, Andhra Pradesh, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 1, No 7 (2009), Pagination: 243-247Abstract
Employee Performance and Recognition Portal is online Performance Appraisal and Recognition system used by all the employees in different sections of the company. Salary hike and promotion depends upon the employee performance. This portal is a one stop shop for all the employees to provide details like tasks performed and performance measures improved etc to their superiors. It allows superiors to evaluate and analyze the employee’s performance and work done by him and target achieved in a given period of time and to rate him. It provides a very good interface between superiors and subordinates. Based on these ratings and overall performance shown by employees ranks will be allotted to them among the group of employees with same designation. This rank is called consolidated rank. This is the basic criteria for recognizing employee’s performance and to provide salary hike/promotion to any employee. This application maintains the entire data in a centralized and secured database server to maintain consistency in report generation and allows users to access from any location. This is an online application that allows multi user access of system and to track or manage the data simultaneously. Various roles and authentications have been provided and access to various areas in the tool is restricted according to the role given to users. The aim of this application is to reduce the manual effort needed to manage the details of tasks and performance measures of each and every employee which is very tedious. And maintaining historical data used by HR team in generating consolidated data is not possible. This portal helps them in generating consolidated rank or required reports with a single click. Also this application provides an interface to management and other users to manage the details of and to generate required reports. This helps to prevent unnecessary delays and human errors. This system helps in generating foolproof reports with in not time by users which is very difficult in current system (manual system). This system design is modularized into various categories. This system has enriched UI so that a novice user did not feel any operational difficulties. This system mainly concentrated in designing various reports requested by the users as well as higher with export to excel options.Features
• 24 X 7 availability
• Better component design to get better performance at peak time
• Flexible service based architecture will be highly desirable for future extension
• Professional look and feel
• Browser testing and support for IE
• Website is highly customizable and flexible enough to easily deploy without much effort
• Secured data driven role based access.