Security and trust in software architecture design

Assignment Help Basic Computer Science
Reference no: EM133054628

This assignment is aimed to let you practice Security and Trust in Software Architecture design. Assume we are developing a management system for a library system. In this system, users can borrow and return books, managers can add and delete books from the system. Your work is to use the UML class diagram to design a role-based access control for this system.

1. Design the framework and draw the structure by using the UML class diagram . The designed framework should include at least three objects: book, user, manager.

2. Based on the diagram, Explain how your designed structure conforms to at least three security principles for computer security.

3. The structure should demonstrate how access control is managed. Based on the diagram, Explain how access control works.

Reference no: EM133054628

Questions Cloud

Design of network for large organization : Think about and describe a scenario whereby you are the individual responsible for the design of a network for a large organization.
Privacy and confidentiality important for study participants : Why are privacy and confidentiality important for your study participants? What are some ways to maintain and ensure privacy and confidentiality?
Appropriate chain of custody and evidence integrity : Discuss three considerations that must be addressed to effectively follow the appropriate chain of custody and evidence integrity.
What kinds of errors might one get when uninstalling program : What kinds of errors might one get when uninstalling a program? What resources are available to help with these errors?
Security and trust in software architecture design : This assignment is aimed to let you practice Security and Trust in Software Architecture design.
Biggest privacy concern when going online : What is your biggest privacy concern when going online? Think about the websites and online services you most often use.
Network devices and end nodes in network : What type of naming structure would you give to servers, network devices and end nodes in this network? Provide a few examples.
Advances in information and communication technology : The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry
Explain the impact of each risk on the organization : Consider the potential vulnerabilities or threats facing the organization. Explain the impact of each risk on the organization.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Leader contribution to the success of a fortune

Compose a 2-3pg essay (not including title/works cited page) on a leader's contribution to the success of a Fortune 500 Company in the 21st Century.

  Free riding is always problematic

Housing becomes public good when it is non-excludable and non-rivalrous; that is, the use of others does not reduce the availability and that people cannot

  Application-incident response

Even with the best security system, an organization's information systems are never fully safe from outside attacks or malicious activities from insiders.

  What is the test statistic for a sample proportion

To test H0: p = 0.500, what is the test statistic for a sample proportion 0.566 and sample size 70. Enter your answer with 3 decimal places.

  Banking or investment? company

Given that the company is based in city? X, what is the probability that it is a banking or investment? company?

  Why must outcomes and measurement metric

Why must outcomes and measurement metric be identified and agreed upon?

  Briefly state your views on this issue and defend

Buyer organizations seeking IT services usually require an oral presentation, with questions and answers, from the final several potential contractors.

  Calculate the load factor and capacity

A power station has a load cycle as under: 260 MW for 6 hr: 200MW for 8 hr; 160 MW for 4hr; 100MW for 6hr. If the power station is equipped with 4 sets of 75 MW each. Calculate the load factor and capacity factor from the above data.

  Describe an algorithm to find the kth shortest path

Suppose that every directed cycle in a graph G has a positive length. Show that a shortest directed walk from node s to node t is always a path. Construct an example for which the first shortest directed walk is a path, but the second shortest dir..

  Standards and conventions of the it community

Ensure that your writing is professional and consistent with the standards and conventions of the IT community.

  What was the vulnerability in the target breach

What was the vulnerability in the Target Breach? From the news: How were NSA's hacker tools compromised? What is the most dangerous hacker tool?

  Statewide goal and national goal

Expanding broadband in southeast Ohio and greater Appalachia is both a statewide goal and a national goal.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd