99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代做COMP SCI 7412、代寫Java,python編程
代做COMP SCI 7412、代寫Java,python編程

時間:2024-10-28  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



Course Name: Secure Software Engineering
Course Code: COMP SCI 7412/4812
Assessment Component: Software Design and Prototyping Project (40%) – Group and Individual Assessment
Project Description
Topic: A Privacy-by-Design Home Services Application during COVID-19
Image that COVID-19 is still around.
COVID-19 is a global pandemic affecting over 200 countries, after its first recorded outbreak in December 2019. To counter its spread, numerous measures have been under-taken by public health authorities, e.g., quarantining of people, lock-downs, curfews, physical distancing, and mandatory use of face masks. Identifying those who have been in close contact with infected individuals, followed by self- isolation (so called contact tracing) has proven particularly effective. Consequently, contact tracing has emerged as a key tool to mitigate the spread. However, manual contact tracing, using an army of “detectives” is not trivial and has proven challenging for many countries. Notably, it is difficult due to the rapid and exponential growth patterns of the virus and the increased demands on qualified human resources. Thus, in many countries it has become extremely difficult to perform manual contact tracing.
Government authorities around the world, together with industry, have sought to address the challenge by developing contact tracing applications and services. A plethora of apps and services are still being deployed around the globe. Proponents argue that the low cost and scalable nature of contact tracing apps make them an attractive option for health authorities. Despite this, contact tracing apps are not universally popular, with a number of prominent critics. They have proven particularly controversial due to potential violations of privacy, and security consequences from the mass-scale installation of (rapidly developed) apps across entire populations. Despite attempts to alleviate these concerns by both governments and industry, it is well known that the anonymization of individual information is a challenging problem.
Meanwhile, people’s activity, including cross border travel, has been restricted during the pandemic. For example, in South Australia, there are level systems define the activity restrictions (requirements related to density, mask wearing, private activity cap, sports, stay at home, etc) and travel restrictions (restrictions related to COVID-19 test, entry to SA, quarantine, etc). Considering that it has been more than two years into the coronavirus pandemic, nations has accepted that Covid- 19 is not going away, despite high vaccination rates drastically cutting the number of hospitalizations and deaths. Although we can protect ourselves by staying at home, it’s not the best way to “live with covid”. Therefore, how to help people meet each other / date under restrictions could be a new challenge to software industry.
In this project, you are required to (i) investigate into the current status of COVID contact tracing and Home Services apps; (ii) research and understanding the potential privacy issues in kinds of contact tracing and Home Services apps from different regions/countries; and (iii) design and implement a privacy- by-design solution to protect user privacy as much as possible while ensure the essential performance, e.g., the accuracy and effectiveness of contact tracing, the restriction information notification, the basic functionalities for a Home Services app.
  1

Some Useful Links/ References
J. Bay, J. Kek, A. Tan, C. S. Hau, L. Yongquan, J. Tan, and T. A. Quy,“Bluetrace: A privacy-preserving protocol for community-driven contact tracing across borders,” Government Technology Agency Singapore, Tech. Rep, 2020
“COVIDSafe,” https://www.health.gov.au/resources/apps-and-tools/covidsafe-app
“COVID SAfe check-in”, https://www.covid-19.sa.gov.au/restrictions-and-responsibilities/covid-safe-
check-in
C. Troncoso, M. Payer, J.-P. Hubaux, M. Salath ́e, J. Larus, E. Bugnion, W. Lueks, T. Stadler, A. Pyrgelis, D. Antonioliet al., “Decentralized privacy-preserving proximity tracing,” arXiv preprint arXiv:2005.122**,2020.
“Analysis of DP3T between scylla and charybdis,” https://eprint.iacr.org/2020/399.pdf
L. Ferretti, C. Wymant, M. Kendall, L. Zhao, A. Nurtay, L. Abeler-D orner, M. Parker, D. Bonsall, and C. Fraser, “Quantifying SARS-CoV-2 transmission suggests epidemiccontrol with digital contact tracing,” Science, 2020
“In Coronavirus fight, China gives citizens a color code, with red flags,”
https://www.nytimes.com/2020/03/01/business/china-coronavirus-surveillance.html
“How to create a mobile travel app?” https://theappsolutions.com/blog/development/build-mobile- travel-app/
Implementation
Programming languages are open to implement your system. Your system should be designed for public distribution. All milestones should be accompanied by a README.txt file containing installation instructions and, as necessary, installation scripts. If users cannot run your system, they cannot use it. If we cannot run your system, we cannot grade it. When building a system in industry, it is generally a good idea to extend existing components rather than build your own. For example, there are many third-party systems and tools available for building web services. Some can prevent buffer overflows and other vulnerabilities. But if you believe it makes sense to incorporate other third-party code into your project, you must clearly acknowledge the source of that code in your documents and demos.
Milestones
This project is broken down into three phases. For the Final milestone, you will submit an individual task report and a group task report of the project (up through that milestone). The high-level description is provided below:
          Individual tasks and due dates
Group tasks and due dates
   Milestone 1
   Individual task 1 – Requirement Elicitation, Security/Privacy Goals, and Functionality Documentation
   Group task 1 – Design Sketch and Decisions
 2

   Milestone 2
   Individual task 2 – Detailed Design and Modelling
   Group task 2 – Product Design and Preliminary Implementation
 Final Individual task 3 – Final Individual Final presentation + demonstration video
   40 marks
Report (12 marks) (14 marks)
Group task 3 – Group Project Report (14
marks)
       Note: There is no submission required for Milestone 1 & 2, so that you can use the description and requirements in Milestone 1 & 2 as checklists and ensure that your project is progressing smoothly. Please include the reports of Milestone 1 & 2 in your final Group Project Report.
3

The list of individual tasks:
I1. Requirement Elicitation and Security Goals/Functionality Documentation – You are asked to elicit and document 5 new security/privacy requirements (i.e., features) for the chosen project. You are expected to carry out some research on the different aspects of the project for eliciting five new requirements (i.e., features). The elicited 5 new security requirements need to be documented using the template below (i.e., ID, name, description, and rationale/security goals).
ID Name Description Rationale/Security Goals
Rubrics:
1. The requirements should be related to the requirements for the project in Secure Software Engineering.
2. The requirements should be unambiguous and complete.
3. The requirements should properly balance between security/privacy goals and functionality.
I2. Detailed Design and Modelling – You are asked to perform detailed design and modelling of the 2 requirements of your individual Task 1. The design and modelling output must include a detailed class diagram for the two requirements used for analysis and 2 sequence diagrams for the chosen requirements. You are expected to use a suitable modelling tool (e.g., LucidChart, MS Visio, or OmniGraffle). The detailed design and modelling task of the project must be formalized into a document suitable for a development team to implement.
Rubrics:
1. The sequence diagram must include actors and at least 3-4 objects and timeline of the objects. A short description must be included to describe each of the sequence diagrams.
2. The class diagram is detailed and captures all aspects of the two requirements modelled. A short description must be included to describe key aspects of the class diagram.
3. The class diagram includes correct relationships (e.g., aggregation, composition, etc.) and classes include 2-3 relevant attributes and 2-3 suitable operations.
I3. Final Individual Report – You are expected to report what you have contributed to the final project. The report should introduce the security or privacy issue you focused on and give a description of the related requirement, feature design, and solution you implemented. Please demonstrate the methodology and the functionality of the implementation.
Please also include your reflection of the project. For example, what you have learned in this project (e.g., programming skill, project management, or team work) and what could be improved in the future.
        R01
   Renovating a bathroom via the app
  A member whose identity has been verified may have the option to start working on renovating a bathroom of a client. A member may also meet the client in person to discuss the plans or cancel a job if they feel unsafe.
    For a job, getting everything that was mentioned in the job description is one of the most important features that clients are going to rate members for.
   4

The list of group tasks:
G1. Design Sketch and Decisions – Your team is asked to work in your assigned group to brainstorm high level design options and perform design sketching based on the requirements and security/privacy goals from the individual Task 1 (use requirements from group members). Then draw a storyboard that should illustrate the usage scenario and interaction between actors and the system (see an example below). The storyboard must have at least 5 sketches. Sketches can be done on paper, electronically or whiteboard. The group work can be captured as a photo which can be presented in milestone. Based on the brainstorming process from the sketches and storyboard, a team is required to document at least 5 design decisions and their rationale using the suggested template.
    Design Issue Context
Quality Attributes Solution
Table 1: The template of the design decision.
(What is the design issue) The software system has no authentication/authorization mechanism
(Why the issue needs to be addressed) The system hosts sensitive data, which should not be made accessible to every user.
(Which quality attributes will be affected by the issue) Security, Performance, Availability
(How to address the issue) Incorporate authentication/authorization mechanism
         Description
   (Brief description of the proposed solution) The system should incorporate a two- layer access mechanism – authentication using Brokered authentication pattern and authorization using Role-based authorization pattern.
   Rationale
  (Why this solution is selected) The authentication mechanism will ensure that the user is already a registered and legitimate user of the system. Furthermore, the authorization mechanism will ensure that the user will not access any data or service for which the user does not have access privileges.
 5

Rubrics:
1. The sketches are sufficiently detailed, suitably labelled, and easily understandable.
2. The design decisions are suitable for addressing the selected design issues to be addressed. At
least one design decision incorporates one design pattern.
3. The design decisions and their rationale are appropriately documented using the provided
template.
G2. Product Design and Preliminary Implementation – Your team is asked to design systems that are privacy-by-design based on the requirements you have selected to work with. Each group will be using this design when implementing a prototype as requested in other tasks.
Rubrics:
1. Designs are reasonably and correctly designed.
2. Designs should be consistent across different features (i.e., requirements).
3. Designs should be appropriate and natural for your system’s functionality and expected scale.
G3. Project Presentation, Report and Demonstration Recording
The slides presentation should include no more than 12 slides excluding the title and the conclusion/reference slides. The presentation should highlight the security/privacy requirements addressed, the system overview, the class diagram, the key design decisions, the user interfaces, and the developed prototype. Each member of the team must actively participate in the presentation.
Your team will summarize your completed course project in a report (at most 10 A4 pages, excluding references and appendix), and demonstrate the final deliverable by video recording (prototype explanation and demonstration). Your team will be required to submit a final demonstration of your prototype as a video (i.e., a YouTube URL) and a zip file of the source code.
Rubrics:
1. The slides are of good quality/professional and include all the necessary information.
2. The presentation engages the audience and is completed on time.
3. The prototype must be executable.
4. The prototype must include at least 5 requirements.
5. The video recording must be professionally edited with a high resolution (at least 480p) and included some explanation.

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp





 

掃一掃在手機打開當前頁
  • 上一篇:CSSE2010代做、代寫c/c++編程設計
  • 下一篇:COMP 3811 代寫、代做 java /c++編程
  • ·代做COMP642、代寫Python編程設計
  • ·代寫CSSE7030、代做Python編程設計
  • · COMP338代做、python編程語言代寫
  • ·代做3DA3 C02、Java/python編程代寫
  • ·代做cmsc14100 編程、代寫python編程語言
  • ·代做ENG5027、代寫Python編程設計
  • ·FINM8006代寫、代做Python編程設計
  • ·ITMF7.120代寫、代做Python編程設計
  • ·代寫4CM508、代做C++,Python編程語言
  • ·ENG 5105代做、代寫Java/Python編程設計
  • 合肥生活資訊

    合肥圖文信息
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發動機性能
    挖掘機濾芯提升發動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
    合肥機場巴士2號線
    合肥機場巴士2號線
    合肥機場巴士1號線
    合肥機場巴士1號線
  • 短信驗證碼 豆包 幣安下載 AI生圖 目錄網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                亚洲少妇最新在线视频| 亚洲欧美一区二区三区国产精品| 亚洲国产精品成人综合| 日韩中文字幕91| 欧美xxxxxxxxx| 国内精品久久久久影院薰衣草| 国产午夜亚洲精品不卡| 国产剧情av麻豆香蕉精品| 欧美激情中文不卡| 91女厕偷拍女厕偷拍高清| 亚洲宅男天堂在线观看无病毒| 欧美精品亚洲一区二区在线播放| 午夜精品视频一区| 中文一区在线播放| 91精品国产高清一区二区三区蜜臀| 国产主播一区二区三区| 国产精品国产三级国产普通话三级| 欧美三级日本三级少妇99| 美女视频网站黄色亚洲| 中文字幕在线一区免费| 欧美一卡2卡三卡4卡5免费| 懂色av一区二区三区免费观看| 亚洲v中文字幕| 亚洲欧洲av在线| 精品粉嫩超白一线天av| 欧洲精品视频在线观看| 国产91丝袜在线播放0| 亚洲一区成人在线| 国产精品嫩草久久久久| 久久影院视频免费| 欧美一区二区三区在线看| 丁香六月综合激情| 久久精品99国产国产精| 日韩国产一二三区| 国产日本欧美一区二区| 91精品一区二区三区在线观看| 黄网站免费久久| 日本三级韩国三级欧美三级| 亚洲一区二区中文在线| 伊人性伊人情综合网| 国产日韩欧美精品电影三级在线| 6080国产精品一区二区| 欧美午夜精品久久久| 99久久综合国产精品| 国内精品伊人久久久久av一坑| 男女激情视频一区| 一区二区成人在线| 亚洲精选视频在线| 亚洲激情图片qvod| 精品欧美一区二区三区精品久久 | 国产黑丝在线一区二区三区| 欧美aaa在线| 蜜臀av一级做a爰片久久| 亚洲美女淫视频| 午夜欧美在线一二页| 天天av天天翘天天综合网色鬼国产| 精品久久久久一区二区国产| 色综合久久久久综合体桃花网| 国产馆精品极品| 99精品热视频| 99久久婷婷国产综合精品电影 | 日本一区二区三区高清不卡| 久久久欧美精品sm网站| 久久看人人爽人人| 中文字幕不卡一区| 中文字幕一区二区三区四区不卡 | 国产区在线观看成人精品 | 色综合网色综合| 欧美日韩高清在线播放| 日韩午夜在线影院| 欧美极品少妇xxxxⅹ高跟鞋| 亚洲桃色在线一区| 天天爽夜夜爽夜夜爽精品视频| 男男gaygay亚洲| 国产精品一区二区三区四区| 91浏览器入口在线观看| 欧美女孩性生活视频| 国产亚洲综合在线| 亚洲成av人片在线观看无码| 国产一区在线观看麻豆| 波多野结衣91| 日韩视频免费观看高清完整版在线观看 | 一本大道av一区二区在线播放| 欧美曰成人黄网| 久久综合视频网| 亚洲精品成人少妇| 国产在线不卡一区| 欧美性猛交xxxx乱大交退制版| 日韩欧美高清一区| 国产精品日日摸夜夜摸av| 亚洲va国产天堂va久久en| 国产成人av一区二区三区在线 | 欧美午夜一区二区三区| 2欧美一区二区三区在线观看视频| 国产精品情趣视频| 激情综合一区二区三区| 成人不卡免费av| 精品国产露脸精彩对白| 性久久久久久久| 一本久道久久综合中文字幕 | 91在线国内视频| 欧美一区二区久久| 亚洲精品少妇30p| 精品亚洲免费视频| 欧美日韩一区视频| 一区二区三区欧美久久| 成+人+亚洲+综合天堂| 久久综合一区二区| 天天做天天摸天天爽国产一区| 91在线国产福利| 国产精品国模大尺度视频| 久久电影网电视剧免费观看| 色综合激情久久| 国产亚洲精久久久久久| 午夜影视日本亚洲欧洲精品| 国产激情精品久久久第一区二区| 日韩欧美一级二级三级| 亚洲精品国产a| 99久久精品国产导航| 国产亚洲一区字幕| 国产一区久久久| 日韩欧美一二区| 亚洲一区二区不卡免费| 国产91综合一区在线观看| 欧美日韩免费电影| 亚洲电影在线免费观看| 欧美羞羞免费网站| 午夜精品福利一区二区蜜股av| 粉嫩aⅴ一区二区三区四区五区| 9191久久久久久久久久久| 亚洲午夜羞羞片| 在线免费av一区| 一个色综合av| 欧美日韩免费电影| 一区二区三区免费看视频| 99精品国产99久久久久久白柏| 26uuu精品一区二区| 国产一区在线观看视频| 中文字幕免费不卡在线| av电影在线观看完整版一区二区| 久久精品网站免费观看| 99久久国产综合精品麻豆| 国产精品免费视频观看| 色哟哟一区二区在线观看| 国产视频一区在线播放| 国产精品视频你懂的| 亚洲猫色日本管| 久久电影网站中文字幕| 麻豆中文一区二区| 精品伦理精品一区| 国产曰批免费观看久久久| 亚洲国产精品高清| 不卡av在线免费观看| 一区二区免费视频| 精品视频1区2区| 久久99深爱久久99精品| 国产精品免费aⅴ片在线观看| 国产成人av一区二区三区在线| 亚洲欧美日韩在线不卡| 日本韩国一区二区| 亚洲一区二区三区激情| 7777精品伊人久久久大香线蕉完整版| 天天综合色天天| 久久女同互慰一区二区三区| 成人精品小蝌蚪| 亚洲成a人在线观看| 欧美大片日本大片免费观看| 国产精品456露脸| 中文字幕在线不卡视频| 欧美精品自拍偷拍动漫精品| 老司机精品视频在线| 亚洲色图欧美激情| 日韩手机在线导航| 91蝌蚪porny九色| 亚洲成人激情av| 国产欧美日韩在线看| 91啪亚洲精品| 美女视频黄 久久| 日韩成人午夜精品| 亚洲四区在线观看| 国产欧美综合在线观看第十页| 日韩欧美高清dvd碟片| 日本韩国欧美三级| 国产成人精品免费| 午夜av一区二区| 亚洲欧美综合另类在线卡通| 国产亚洲精品超碰| 91.xcao| 91黄色小视频| 色综合色综合色综合| 国产盗摄视频一区二区三区| 亚洲福利一区二区| 综合中文字幕亚洲| 精品久久一二三区| 日韩精品一区二区三区视频| 欧美在线啊v一区| 99vv1com这只有精品| 国产精品伊人色| 日韩精品亚洲专区| 性做久久久久久免费观看|