Home‎ > ‎

December 2012

Volume:11, Issue:2, December' 2012


A Comparative Study of Reviewers’ Effectiveness in Simulated Stressed and Relaxed Design Inspection Environments

Author: Olalekan S. Akinola


Software inspection process is one of the globally accepted means of ascertaining the quality of software products. However, suitable techniques and environment for carrying out this process is still a controversial issue among researchers. The issue becomes more controversial when there is a proximity to software project deadline and quality of the software must not be compromized. This study takes software inspection to another level by subjecting reviewers (inspectors) to two different inspection environments – relaxed and simulated stressed environment. Sixty reviewers divided into two groups of thirty members each were given a process model (Data Flow Diagram, DFD) design document to inspect with the aid of a checklist. Briefly, the result obtained from this study suggests that software inspection reviewers tend to perform effectively when there is a proximity to software project deadline.

(pp. 652-660)                    Download PDF


Fingerprint Template Protection using Steganography

Authors: Sangam, Manoj Diwakar and Pratibha Sharma


Fingerprint is considered as unique id of human being. A fingerprint authentication system should be vulnerable to variety of attacks. In fingerprint authentication system the key element in which security is needed is fingerprint template database.  In this paper we propose a scheme to secure fingerprint template database using steganography. In this scheme steganography is applied at two levels which increase security of the system and make authentication of user reliable.

(pp. 661-664)                    Download PDF


Increasing Auditability in Web Application Security

Authors: M. Kahonge, William Okello-Odongo and Evans K. Miriti


As more services become web based and open to a larger audience, security is become a key concern. We discuss the idea of auditability of a transaction in the web application environment and how current logs may not capture minimum information required to have a complete audit record. We then propose a solution to this that involves a design as well as a tool that can be integrated into an existing web application to generate supplementary logs of database activity and user profile information with a focus on auditability of transactions. Finally we talk about results of tests that we conducted of this tool on an actual web application.

(pp. 665-668)                    Download PDF