ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Announcement
Indexing
Contact Us
Home
/
Search for: use cases
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Review Paper
Instructions to Reviewers
Statistics
Representing Access Control Policies in Use Cases Khaled Alghathbar
Abstract: Security requirements of a software product need to receive attention throughout its development lifecycle. This
# Access control policies
# security engineering
# use cases
# misuse
Named Entity Recognition for Automated Test Case Generation
Abstract: Testing is the process of evaluating a software or hardware against its requirement specification. It helps to verify
#Named entity recognition
# test case generation
# scenario matrix
# decision table december
Representing Access Control Policies in Use Cases Khaled Alghathbar
Abstract: Security requirements of a software product need to receive attention throughout its development lifecycle. This
# Access control policies
# security engineering
# use cases
# misuse
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint