Learn More
Security is now the most critical feature of any computing systems. Eliciting and analyzing security requirements in the early stages of the system development process is highly recommended to reduce security vulnerabilities which might be found in the later stages of the system development process. In order to address this issue, we will propose a new(More)
BACKGROUND Subcutaneous drainage is considered effective for preventing wound infections, but only anecdotal evidence supports its clinical benefit. The present study evaluated the benefit of subcutaneous drainage in preventing wound infections in patients undergoing liver resection. METHODS Patients scheduled for liver resection were randomly assigned to(More)
Although aspect-oriented software development is regarded as a suitable way to build non-functional requirements such as security concerns, there are few researches for identifying security aspects in early development stages. This paper presents an approach for identifying security aspects and pointcuts in a requirement analysis stage with extending misuse(More)
To establish a preoperative morphological classification system for hepatocellular carcinoma using multiphase computed tomography. All consecutive patients who were diagnosed with hepatocellular carcinoma between 2004 and 2009 were enrolled, for a total of 232 patients. The concavity and convexity of each outer contour of hepatocellular carcinoma acquired(More)
1. Acute exposure to ozone is known to cause airway hyperresponsiveness, which, at least in part, seems to result from an increase in the permeability of the airway mucosa. Recently, we demonstrated that depletion of sensory neuropeptides inhibits the ozone-induced increase in the permeability of the tracheal mucosa in guinea-pigs. The aim of this study was(More)
Unlike functional implementations, it is difficult to analyze the impact software enhancements on security. One of the difficulties is identifying the range of effects by new security threats, and the other is developing proper countermeasures. This paper proposes an analysis process that uses two kinds of security pattern: security requirements patterns(More)