Learn More
Security is now the most critical feature of any computing systems. Eliciting and analyzing security requirements in the early stages of the system development process is highly recommended to reduce security vulnerabilities which might be found in the later stages of the system development process. In order to address this issue, we will propose a new(More)
It is difficult to apply existing software development methods to security concerns. Using software for security testing purposes, in particular, is hard to do. The fact that there is a restriction on the implementation of software affects the ease with which security can be tested. In this paper we propose a decision process of coding conventions for(More)
BACKGROUND To establish a preoperative morphological classification system for hepatocellular carcinoma using multiphase computed tomography. METHODS All consecutive patients who were diagnosed with hepatocellular carcinoma between 2004 and 2009 were enrolled, for a total of 232 patients. The concavity and convexity of each outer contour of hepatocellular(More)
Unlike functional implementations, it is difficult to analyze the impact software enhancements on security. One of the difficulties is identifying the range of effects by new security threats, and the other is developing proper countermeasures. This paper proposes an analysis process that uses two kinds of security pattern: security requirements patterns(More)
BACKGROUND Subcutaneous drainage is considered effective for preventing wound infections, but only anecdotal evidence supports its clinical benefit. The present study evaluated the benefit of subcutaneous drainage in preventing wound infections in patients undergoing liver resection. METHODS Patients scheduled for liver resection were randomly assigned to(More)
Although aspect-oriented software development is regarded as a suitable way to build non-functional requirements such as security concerns, there are few researches for identifying security aspects in early development stages. This paper presents an approach for identifying security aspects and pointcuts in a requirement analysis stage with extending misuse(More)