首页> 外文期刊>Software, IET >Classification as an approach to public key infrastructure requirements analysis
【24h】

Classification as an approach to public key infrastructure requirements analysis

机译:分类作为公钥基础设施需求分析的一种方法

获取原文
获取原文并翻译 | 示例
           

摘要

Classification schemes and taxonomy of request have focused only on business or software requirements defined by general non-functional requests. Public key infrastructure (PKI), as a complex system, requires special attention in the process of identification and definition of requests in all parts of the system. Requests efficiently identified and defined are the basis for successful PKI development and implementation. This study proposes a new classification scheme of requirements that enable effective identification of PKI requests in all system development life cycle phases. The proposed classification scheme has been designed in a way that can be used both by organisations just introducing a PKI system in their business operations, as well as organisations developing and implementing the PKI. Although there are more classification schemes and taxonomy of requests, the proposed classification scheme is the optimum solution for identification and definition of PKI system requests, as well as a good basis for testing, verification and validation of the PKI final product.
机译:请求的分类方案和分类仅关注一般非功能性请求定义的业务或软件要求。作为一个复杂的系统,公钥基础结构(PKI)在系统所有部分的请求识别和定义过程中需要特别注意。有效识别和定义的请求是成功开发和实施PKI的基础。这项研究提出了一种新的需求分类方案,可以在所有系统开发生命周期阶段中有效识别PKI请求。提议的分类方案的设计方式可以被仅在其业务运营中引入PKI系统的组织以及开发和实施PKI的组织使用。尽管存在更多的分类方案和请求分类法,但提出的分类方案是识别和定义PKI系统请求的最佳解决方案,同时也是测试,验证和确认PKI最终产品的良好基础。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号