Software engineering's lifecycle models havc proven to be very important for traditional software development. However, can these models be applied to the development of Web-based applications as well? In recent yea...Software engineering's lifecycle models havc proven to be very important for traditional software development. However, can these models be applied to the development of Web-based applications as well? In recent years, Web-based applications have become more and more complicated and a lot of efforts have been placed on introducing new technologies such as J2EE, PhP, and .NET, etc., which have been universally accepted as the development technologies for Web-based applications. However, there is no universally accepted process model for the development of Web-based applications. Moreover, shaping the process model for small medium-sized enterprises (SMEs), which have limited resources, has been relatively neglected. Based on our previous work, this paper presents an expanded lifecycle process model for the development of Web-based applications in SMEs. It consists of three sets of processes, i.e., requirement processes, development processes, and evolution processes. Particularly, the post-delivery evolution processes are important to SMEs to develop and maintain quality web applications with limited resources and time.展开更多
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed eit...In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate software development model to guide the development process, or the use of a software development model that does not consider security as a key factor. Therefore, this systematic literature review is conducted to investigate the various security vulnerabilities used to secure the web application layer, the security approaches or techniques used in the process, the stages in the software development in which the approaches or techniques are emphasized, and the tools and mechanisms used to detect vulnerabilities. The study extracted 519 publications from respectable scientific sources, i.e. the IEEE Computer Society, ACM Digital Library, Science Direct, Springer Link. After detailed review process, only 56 key primary studies were considered for this review based on defined inclusion and exclusion criteria. From the review, it appears that no one software is referred to as a standard or preferred software product for web application development. In our SLR, we have performed a deep analysis on web application security vulnerabilities detection methods which help us to identify the scope of SLR for comprehensively investigation in the future research. Further in this SLR considering OWASP Top 10 web application vulnerabilities discovered in 2012, we will attempt to categories the accessible vulnerabilities. OWASP is major source to construct and validate web security processes and standards.展开更多
In this work, we have developed a web application for Baccalaureate grades processing in Niger. This online application allows to replace Excel based manual grades processing with fully automated one. Thus, the applic...In this work, we have developed a web application for Baccalaureate grades processing in Niger. This online application allows to replace Excel based manual grades processing with fully automated one. Thus, the application helps to minimize the errors caused by the Excel manipulation. It also allows rapid centralization of all results at the exam service level. For the development, we adopted the agile method. This method is very efficient in allowing us to prioritize our real needs and the application is enriched as these needs arise. For the design, we used the UML Modeling language and for the implementation, we used a number of computer tools such as PHP, JavaScript, HTML, Jquery, AJAX, Bootstrap and CSS.展开更多
Quality is a key factor to ensuring success of e-government websites. Therefore, a definition for high-quality e-government website is required, as well as, an e-government system’s quality evaluation methodology. Th...Quality is a key factor to ensuring success of e-government websites. Therefore, a definition for high-quality e-government website is required, as well as, an e-government system’s quality evaluation methodology. This paper identifies quality attributes that are required to assess the quality of an e-government website, which should be considered by developers during the development of e-government applications. The primary goals are identifying, qualifying, categorizing, and ranking these factors, and then defining the interrelations among these quality factors.展开更多
文摘Software engineering's lifecycle models havc proven to be very important for traditional software development. However, can these models be applied to the development of Web-based applications as well? In recent years, Web-based applications have become more and more complicated and a lot of efforts have been placed on introducing new technologies such as J2EE, PhP, and .NET, etc., which have been universally accepted as the development technologies for Web-based applications. However, there is no universally accepted process model for the development of Web-based applications. Moreover, shaping the process model for small medium-sized enterprises (SMEs), which have limited resources, has been relatively neglected. Based on our previous work, this paper presents an expanded lifecycle process model for the development of Web-based applications in SMEs. It consists of three sets of processes, i.e., requirement processes, development processes, and evolution processes. Particularly, the post-delivery evolution processes are important to SMEs to develop and maintain quality web applications with limited resources and time.
文摘In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate software development model to guide the development process, or the use of a software development model that does not consider security as a key factor. Therefore, this systematic literature review is conducted to investigate the various security vulnerabilities used to secure the web application layer, the security approaches or techniques used in the process, the stages in the software development in which the approaches or techniques are emphasized, and the tools and mechanisms used to detect vulnerabilities. The study extracted 519 publications from respectable scientific sources, i.e. the IEEE Computer Society, ACM Digital Library, Science Direct, Springer Link. After detailed review process, only 56 key primary studies were considered for this review based on defined inclusion and exclusion criteria. From the review, it appears that no one software is referred to as a standard or preferred software product for web application development. In our SLR, we have performed a deep analysis on web application security vulnerabilities detection methods which help us to identify the scope of SLR for comprehensively investigation in the future research. Further in this SLR considering OWASP Top 10 web application vulnerabilities discovered in 2012, we will attempt to categories the accessible vulnerabilities. OWASP is major source to construct and validate web security processes and standards.
文摘In this work, we have developed a web application for Baccalaureate grades processing in Niger. This online application allows to replace Excel based manual grades processing with fully automated one. Thus, the application helps to minimize the errors caused by the Excel manipulation. It also allows rapid centralization of all results at the exam service level. For the development, we adopted the agile method. This method is very efficient in allowing us to prioritize our real needs and the application is enriched as these needs arise. For the design, we used the UML Modeling language and for the implementation, we used a number of computer tools such as PHP, JavaScript, HTML, Jquery, AJAX, Bootstrap and CSS.
文摘Quality is a key factor to ensuring success of e-government websites. Therefore, a definition for high-quality e-government website is required, as well as, an e-government system’s quality evaluation methodology. This paper identifies quality attributes that are required to assess the quality of an e-government website, which should be considered by developers during the development of e-government applications. The primary goals are identifying, qualifying, categorizing, and ranking these factors, and then defining the interrelations among these quality factors.