国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

代做COMP SCI 7412、代寫Java,python編程
代做COMP SCI 7412、代寫Java,python編程

時(shí)間:2024-10-28  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯(cuò)



Course Name: Secure Software Engineering
Course Code: COMP SCI 7412/4812
Assessment Component: Software Design and Prototyping Project (40%) – Group and Individual Assessment
Project Description
Topic: A Privacy-by-Design Home Services Application during COVID-19
Image that COVID-19 is still around.
COVID-19 is a global pandemic affecting over 200 countries, after its first recorded outbreak in December 2019. To counter its spread, numerous measures have been under-taken by public health authorities, e.g., quarantining of people, lock-downs, curfews, physical distancing, and mandatory use of face masks. Identifying those who have been in close contact with infected individuals, followed by self- isolation (so called contact tracing) has proven particularly effective. Consequently, contact tracing has emerged as a key tool to mitigate the spread. However, manual contact tracing, using an army of “detectives” is not trivial and has proven challenging for many countries. Notably, it is difficult due to the rapid and exponential growth patterns of the virus and the increased demands on qualified human resources. Thus, in many countries it has become extremely difficult to perform manual contact tracing.
Government authorities around the world, together with industry, have sought to address the challenge by developing contact tracing applications and services. A plethora of apps and services are still being deployed around the globe. Proponents argue that the low cost and scalable nature of contact tracing apps make them an attractive option for health authorities. Despite this, contact tracing apps are not universally popular, with a number of prominent critics. They have proven particularly controversial due to potential violations of privacy, and security consequences from the mass-scale installation of (rapidly developed) apps across entire populations. Despite attempts to alleviate these concerns by both governments and industry, it is well known that the anonymization of individual information is a challenging problem.
Meanwhile, people’s activity, including cross border travel, has been restricted during the pandemic. For example, in South Australia, there are level systems define the activity restrictions (requirements related to density, mask wearing, private activity cap, sports, stay at home, etc) and travel restrictions (restrictions related to COVID-19 test, entry to SA, quarantine, etc). Considering that it has been more than two years into the coronavirus pandemic, nations has accepted that Covid- 19 is not going away, despite high vaccination rates drastically cutting the number of hospitalizations and deaths. Although we can protect ourselves by staying at home, it’s not the best way to “live with covid”. Therefore, how to help people meet each other / date under restrictions could be a new challenge to software industry.
In this project, you are required to (i) investigate into the current status of COVID contact tracing and Home Services apps; (ii) research and understanding the potential privacy issues in kinds of contact tracing and Home Services apps from different regions/countries; and (iii) design and implement a privacy- by-design solution to protect user privacy as much as possible while ensure the essential performance, e.g., the accuracy and effectiveness of contact tracing, the restriction information notification, the basic functionalities for a Home Services app.
  1

Some Useful Links/ References
J. Bay, J. Kek, A. Tan, C. S. Hau, L. Yongquan, J. Tan, and T. A. Quy,“Bluetrace: A privacy-preserving protocol for community-driven contact tracing across borders,” Government Technology Agency Singapore, Tech. Rep, 2020
“COVIDSafe,” https://www.health.gov.au/resources/apps-and-tools/covidsafe-app
“COVID SAfe check-in”, https://www.covid-19.sa.gov.au/restrictions-and-responsibilities/covid-safe-
check-in
C. Troncoso, M. Payer, J.-P. Hubaux, M. Salath ́e, J. Larus, E. Bugnion, W. Lueks, T. Stadler, A. Pyrgelis, D. Antonioliet al., “Decentralized privacy-preserving proximity tracing,” arXiv preprint arXiv:2005.122**,2020.
“Analysis of DP3T between scylla and charybdis,” https://eprint.iacr.org/2020/399.pdf
L. Ferretti, C. Wymant, M. Kendall, L. Zhao, A. Nurtay, L. Abeler-D orner, M. Parker, D. Bonsall, and C. Fraser, “Quantifying SARS-CoV-2 transmission suggests epidemiccontrol with digital contact tracing,” Science, 2020
“In Coronavirus fight, China gives citizens a color code, with red flags,”
https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html
“How to create a mobile travel app?” https://theappsolutions.com/blog/development/build-mobile- travel-app/
Implementation
Programming languages are open to implement your system. Your system should be designed for public distribution. All milestones should be accompanied by a README.txt file containing installation instructions and, as necessary, installation scripts. If users cannot run your system, they cannot use it. If we cannot run your system, we cannot grade it. When building a system in industry, it is generally a good idea to extend existing components rather than build your own. For example, there are many third-party systems and tools available for building web services. Some can prevent buffer overflows and other vulnerabilities. But if you believe it makes sense to incorporate other third-party code into your project, you must clearly acknowledge the source of that code in your documents and demos.
Milestones
This project is broken down into three phases. For the Final milestone, you will submit an individual task report and a group task report of the project (up through that milestone). The high-level description is provided below:
          Individual tasks and due dates
Group tasks and due dates
   Milestone 1
   Individual task 1 – Requirement Elicitation, Security/Privacy Goals, and Functionality Documentation
   Group task 1 – Design Sketch and Decisions
 2

   Milestone 2
   Individual task 2 – Detailed Design and Modelling
   Group task 2 – Product Design and Preliminary Implementation
 Final Individual task 3 – Final Individual Final presentation + demonstration video
   40 marks
Report (12 marks) (14 marks)
Group task 3 – Group Project Report (14
marks)
       Note: There is no submission required for Milestone 1 & 2, so that you can use the description and requirements in Milestone 1 & 2 as checklists and ensure that your project is progressing smoothly. Please include the reports of Milestone 1 & 2 in your final Group Project Report.
3

The list of individual tasks:
I1. Requirement Elicitation and Security Goals/Functionality Documentation – You are asked to elicit and document 5 new security/privacy requirements (i.e., features) for the chosen project. You are expected to carry out some research on the different aspects of the project for eliciting five new requirements (i.e., features). The elicited 5 new security requirements need to be documented using the template below (i.e., ID, name, description, and rationale/security goals).
ID Name Description Rationale/Security Goals
Rubrics:
1. The requirements should be related to the requirements for the project in Secure Software Engineering.
2. The requirements should be unambiguous and complete.
3. The requirements should properly balance between security/privacy goals and functionality.
I2. Detailed Design and Modelling – You are asked to perform detailed design and modelling of the 2 requirements of your individual Task 1. The design and modelling output must include a detailed class diagram for the two requirements used for analysis and 2 sequence diagrams for the chosen requirements. You are expected to use a suitable modelling tool (e.g., LucidChart, MS Visio, or OmniGraffle). The detailed design and modelling task of the project must be formalized into a document suitable for a development team to implement.
Rubrics:
1. The sequence diagram must include actors and at least 3-4 objects and timeline of the objects. A short description must be included to describe each of the sequence diagrams.
2. The class diagram is detailed and captures all aspects of the two requirements modelled. A short description must be included to describe key aspects of the class diagram.
3. The class diagram includes correct relationships (e.g., aggregation, composition, etc.) and classes include 2-3 relevant attributes and 2-3 suitable operations.
I3. Final Individual Report – You are expected to report what you have contributed to the final project. The report should introduce the security or privacy issue you focused on and give a description of the related requirement, feature design, and solution you implemented. Please demonstrate the methodology and the functionality of the implementation.
Please also include your reflection of the project. For example, what you have learned in this project (e.g., programming skill, project management, or team work) and what could be improved in the future.
        R01
   Renovating a bathroom via the app
  A member whose identity has been verified may have the option to start working on renovating a bathroom of a client. A member may also meet the client in person to discuss the plans or cancel a job if they feel unsafe.
    For a job, getting everything that was mentioned in the job description is one of the most important features that clients are going to rate members for.
   4

The list of group tasks:
G1. Design Sketch and Decisions – Your team is asked to work in your assigned group to brainstorm high level design options and perform design sketching based on the requirements and security/privacy goals from the individual Task 1 (use requirements from group members). Then draw a storyboard that should illustrate the usage scenario and interaction between actors and the system (see an example below). The storyboard must have at least 5 sketches. Sketches can be done on paper, electronically or whiteboard. The group work can be captured as a photo which can be presented in milestone. Based on the brainstorming process from the sketches and storyboard, a team is required to document at least 5 design decisions and their rationale using the suggested template.
    Design Issue Context
Quality Attributes Solution
Table 1: The template of the design decision.
(What is the design issue) The software system has no authentication/authorization mechanism
(Why the issue needs to be addressed) The system hosts sensitive data, which should not be made accessible to every user.
(Which quality attributes will be affected by the issue) Security, Performance, Availability
(How to address the issue) Incorporate authentication/authorization mechanism
         Description
   (Brief description of the proposed solution) The system should incorporate a two- layer access mechanism – authentication using Brokered authentication pattern and authorization using Role-based authorization pattern.
   Rationale
  (Why this solution is selected) The authentication mechanism will ensure that the user is already a registered and legitimate user of the system. Furthermore, the authorization mechanism will ensure that the user will not access any data or service for which the user does not have access privileges.
 5

Rubrics:
1. The sketches are sufficiently detailed, suitably labelled, and easily understandable.
2. The design decisions are suitable for addressing the selected design issues to be addressed. At
least one design decision incorporates one design pattern.
3. The design decisions and their rationale are appropriately documented using the provided
template.
G2. Product Design and Preliminary Implementation – Your team is asked to design systems that are privacy-by-design based on the requirements you have selected to work with. Each group will be using this design when implementing a prototype as requested in other tasks.
Rubrics:
1. Designs are reasonably and correctly designed.
2. Designs should be consistent across different features (i.e., requirements).
3. Designs should be appropriate and natural for your system’s functionality and expected scale.
G3. Project Presentation, Report and Demonstration Recording
The slides presentation should include no more than 12 slides excluding the title and the conclusion/reference slides. The presentation should highlight the security/privacy requirements addressed, the system overview, the class diagram, the key design decisions, the user interfaces, and the developed prototype. Each member of the team must actively participate in the presentation.
Your team will summarize your completed course project in a report (at most 10 A4 pages, excluding references and appendix), and demonstrate the final deliverable by video recording (prototype explanation and demonstration). Your team will be required to submit a final demonstration of your prototype as a video (i.e., a YouTube URL) and a zip file of the source code.
Rubrics:
1. The slides are of good quality/professional and include all the necessary information.
2. The presentation engages the audience and is completed on time.
3. The prototype must be executable.
4. The prototype must include at least 5 requirements.
5. The video recording must be professionally edited with a high resolution (at least 480p) and included some explanation.

請(qǐng)加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp





 

掃一掃在手機(jī)打開當(dāng)前頁
  • 上一篇:CSSE2010代做、代寫c/c++編程設(shè)計(jì)
  • 下一篇:COMP 3811 代寫、代做 java /c++編程
  • ·代做COMP642、代寫Python編程設(shè)計(jì)
  • ·代寫CSSE7030、代做Python編程設(shè)計(jì)
  • · COMP338代做、python編程語言代寫
  • ·代做3DA3 C02、Java/python編程代寫
  • ·代做cmsc14100 編程、代寫python編程語言
  • ·代做ENG5027、代寫Python編程設(shè)計(jì)
  • ·FINM8006代寫、代做Python編程設(shè)計(jì)
  • ·ITMF7.120代寫、代做Python編程設(shè)計(jì)
  • ·代寫4CM508、代做C++,Python編程語言
  • ·ENG 5105代做、代寫Java/Python編程設(shè)計(jì)
  • 合肥生活資訊

    合肥圖文信息
    流體仿真外包多少錢_專業(yè)CFD分析代做_友商科技CAE仿真
    流體仿真外包多少錢_專業(yè)CFD分析代做_友商科
    CAE仿真分析代做公司 CFD流體仿真服務(wù) 管路流場(chǎng)仿真外包
    CAE仿真分析代做公司 CFD流體仿真服務(wù) 管路
    流體CFD仿真分析_代做咨詢服務(wù)_Fluent 仿真技術(shù)服務(wù)
    流體CFD仿真分析_代做咨詢服務(wù)_Fluent 仿真
    結(jié)構(gòu)仿真分析服務(wù)_CAE代做咨詢外包_剛強(qiáng)度疲勞振動(dòng)
    結(jié)構(gòu)仿真分析服務(wù)_CAE代做咨詢外包_剛強(qiáng)度疲
    流體cfd仿真分析服務(wù) 7類仿真分析代做服務(wù)40個(gè)行業(yè)
    流體cfd仿真分析服務(wù) 7類仿真分析代做服務(wù)4
    超全面的拼多多電商運(yùn)營(yíng)技巧,多多開團(tuán)助手,多多出評(píng)軟件徽y1698861
    超全面的拼多多電商運(yùn)營(yíng)技巧,多多開團(tuán)助手
    CAE有限元仿真分析團(tuán)隊(duì),2026仿真代做咨詢服務(wù)平臺(tái)
    CAE有限元仿真分析團(tuán)隊(duì),2026仿真代做咨詢服
    釘釘簽到打卡位置修改神器,2026怎么修改定位在范圍內(nèi)
    釘釘簽到打卡位置修改神器,2026怎么修改定
  • 短信驗(yàn)證碼 寵物飼養(yǎng) 十大衛(wèi)浴品牌排行 suno 豆包網(wǎng)頁版入口 目錄網(wǎng) 排行網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號(hào)-3 公安備 42010502001045

    国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看
    国产一区二区色| 国产一区二区高清不卡| 日本一区二区在线视频| 国产视频一区二区不卡| 久久久久久久久久久综合| 九九热精品视频国产| 欧美婷婷久久| 日韩在线视频观看正片免费网站| 亚洲高清123| www日韩在线观看| 国产av第一区| 国产免费一区二区三区在线能观看| 久久九九免费视频| 欧洲精品亚洲精品| 久久av一区二区三区亚洲| 一本久道久久综合| 风间由美久久久| 久久久久久12| 99久久精品免费看国产四区| 伊人久久青草| 国产精品自拍片| 亚洲综合精品伊人久久| www黄色av| 午夜精品美女自拍福到在线| 久久综合入口| 日韩欧美视频一区二区| 日韩色av导航| 免费拍拍拍网站| 美女国内精品自产拍在线播放| 精品视频第一区| 伦理中文字幕亚洲| 国产美女在线一区| 亚洲精品欧美日韩| 国产a一区二区| 欧美国产综合视频| 国产精品视频xxx| 国产一区二区三区奇米久涩| 欧美激情xxxxx| 91精品国产综合久久香蕉| 无码内射中文字幕岛国片| 国产成人+综合亚洲+天堂| 日韩精彩视频| 国产精品免费一区二区三区| 国产情侣av自拍| 亚洲精品蜜桃久久久久久| 久久久之久亚州精品露出| 日韩偷拍一区二区| 国产精品无码乱伦| 国产欧美精品在线| 亚洲精品乱码视频| 久久久久五月天| 麻豆中文字幕在线观看| 亚洲午夜高清视频| 国产高清不卡无码视频| 欧美综合在线播放| 久久香蕉国产线看观看av| 国产美女精品在线观看| 亚洲精品一区二区三区蜜桃久| 国产精品av一区| 欧美日韩黄色一级片| 欧美激情免费在线| 国产成人永久免费视频| 黄色激情在线视频| 一本一道久久久a久久久精品91 | 精品国产一区久久久| 麻豆精品视频| 亚洲最新免费视频| 日韩视频在线观看免费| 国产伦精品一区二区三区四区免费 | 黄色一级片国产| 亚洲最大福利网| 日韩网站免费观看| 波多野结衣成人在线| 欧美精品v日韩精品v国产精品| 在线丝袜欧美日韩制服| 精品国产一区二区三区在线观看| 国产精品亚洲二区在线观看| 日韩美女在线观看一区| 中文字幕精品一区日韩| 久久精品一偷一偷国产| 91美女片黄在线观| 国产色综合天天综合网| 日韩免费视频在线观看| 亚洲综合视频1区| 国产精品久久一区| 久久久久久伊人| 国产裸体舞一区二区三区| 欧美亚洲另类制服自拍| 亚洲高清精品中出| 欧美成人亚洲成人| 久久色免费在线视频| 国产成人精品a视频一区www| 成人中文字幕在线观看| 国内精品中文字幕| 欧洲日本亚洲国产区| 午夜美女久久久久爽久久| 久久999免费视频| 国产精品欧美久久| 久久99精品久久久久久久青青日本 | 国产成人亚洲精品| 99热一区二区三区| 国产欧美丝袜| 黄色国产小视频| 欧美成人精品欧美一级乱| 日韩在线第三页| 亚洲福利av在线| 亚洲欧美99| 在线观看成人一级片| 九九精品视频在线| 精品国产乱码久久久久软件| 国产精品乱码| 国产精品久久久久久久久久东京| 久久久国产91| 国产成人精品综合| 日韩少妇与小伙激情| 久久久久久久久久久久久久一区| 91国产丝袜在线放| 99久久激情视频| 97精品久久久| 久久综合九色欧美狠狠| 91精品免费久久久久久久久| www.av一区视频| 成人3d动漫一区二区三区| 麻豆中文字幕在线观看| 韩国福利视频一区| 精品一区二区中文字幕| 精品无人区一区二区三区| 蜜桃传媒一区二区三区 | 久久国产主播精品| www高清在线视频日韩欧美| 久久久久久国产精品一区| 色阁综合伊人av| 久久精品亚洲热| 国产精品高潮呻吟久久av野狼| 国产精品日韩欧美综合| 国产精品高清免费在线观看| 不卡av电影在线观看| 精品国产乱码久久久久久蜜柚 | 国产免费亚洲高清| 高清国产一区| 久久精品一二三区| 国产成人欧美在线观看| 国产精品国模大尺度私拍| 国产99久久精品一区二区 夜夜躁日日躁 | 中文字幕精品一区日韩| 亚洲精品永久www嫩草| 五月天色婷婷综合| 青青草视频在线免费播放| 黄色片网址在线观看| 国产乱子伦精品无码专区| 91精品成人久久| www.国产精品一二区| 欧美成人一区二区三区电影| 亚洲图片都市激情| 欧美与黑人午夜性猛交久久久| 国模私拍视频一区| 97免费视频观看| 久久精品国产第一区二区三区最新章节| 久久久久久香蕉网| 精品国产一区二区三区四区精华| 亚洲国产日韩综合一区| 欧美最猛性xxxx| 国产伦精品一区二区三区视频免费 | 欧美激情中文字幕在线| 日韩中文字幕免费在线| 欧美福利一区二区三区| 成人久久18免费网站图片| 国产超碰91| 国产精品大全| 手机看片日韩国产| 国内少妇毛片视频| 国产精品999999| 国产精品久久久久7777| 午夜精品亚洲一区二区三区嫩草 | 精品91一区二区三区| αv一区二区三区| 北条麻妃在线一区二区| 宅男av一区二区三区| 日本www高清视频| 国产欧美综合一区| 视频直播国产精品| 亚洲综合中文字幕在线| 欧美日韩亚洲一| 91精品成人久久| 两个人的视频www国产精品| 日韩av不卡在线| 国产乱子伦精品| 久久精品福利视频| 午夜精品一区二区在线观看| 含羞草久久爱69一区| 国产成人极品视频| 一本久道中文无码字幕av| 免费拍拍拍网站| 久久久久久久久久久国产| 亚洲综合色av| 国产一区亚洲二区三区| www.午夜精品| 日本一区免费在线观看| 91精品在线观| 又大又硬又爽免费视频|