Anonymous Users Srs

In: Computers and Technology

Submitted By ashmitasharma
Words 1918
Pages 8
Software Requirements Specification

For

Anonymous User Communication For Privacy Protection in Wireless Metropolitan Mesh Networks

Prepared by

Under the Guidance of

Table of Contents

Revision History

1. Introduction

1.1 Purpose 1.2 Project Scope 1.3 References

2. Overall Description

2.1 Product Perspective 2.2 Product Features 2.3 User Classes and Characteristics 2.4 Operating Environment 2.5 Design and Implementation Constraints

3. System Features

3.1 System Feature 1 3.2 System Feature 2 (and so on)

4. External Interface Requirements

4.1 User Interfaces 4.2 Hardware Interfaces 4.3 Software Interfaces 4.4 Communications Interfaces

5. Other Nonfunctional Requirements

5.1 Performance Requirements 5.2 Safety Requirements 5.3 Security Requirements 5.4 Software Quality Attributes

6. Other Requirements

Appendix A: Glossary
Appendix B: Analysis Models

1. Introduction

1. Purpose

The project is to make available security and privacy protection to the user credentials in wireless mesh networks (WMN) using group signature and pair wise secrets terms. 2. Project Scope In wireless mesh network, there is no restriction for public to access the internet or mobile services. So that the large numbers of attacks are might be happened like eavesdrop, inject or impersonate in WMN.All these attacks are great threat to the user credential, because the adversaries’ once disclosed the user’s credential means devastating the user consequences. We proposed two scheme for protect the user’s privacy in wireless mesh networks. The first scheme is basic protocol suite and another one is an advanced protocol suite. In the first protocol is used the group signature technique and another one…...

Similar Documents

Sr-Rm

...SR-rm-022 Part Three Jesca Malabed BSA375 January 3, 2013 Dan Speck SR-KF-013 Part one Riordan Manufacturing is a global plastic manufacturer. The annual projected annual earning is $46 million and employs 550 people. Riordan manufacturer is a fortune 1000 enterprise. Riordan produced plastic beverage containers, custom plastic parts, and plastic fan parts and their major customers are automotive parts manufacturer, aircraft manufacturer, the Department of Defense, beverage makers and bottles, and appliance manufacturer. Riordan has four offices, Georgia, Michigan, China, and the main head quarter in San Jose (University of Phoenix,  2012). HRIS “The company’s HRIS (Human Resources Information System) is part of the financial system package that was installed in 1992. The system keeps track of the following employee information: * Personal information * Pay Rate * Personal exemptions * Hire date * Seniority date * Organization information * Vacation hours (University of Phoenix,  2012). Key Stakeholder The key stakeholders for Riordan Manufacturing are the Finance and Accounting, and Sales and Marketing user. The analyst needs to gather requirements from this two department because if the Finance and Accounting system is change, the Sales and Marketing system needs to be informed. For example the Finance and Accounting change a customer’s information, Sales and Marketing needs to know the new information so Sales and Marketing can...

Words: 1347 - Pages: 6

User

...User DYING, DEATH AND GRIEF: CHAPLAIN PAUL G. DURBIN, PH.D.: TRIBUTE TO DR. ELIZABETH KUBLER-ROSS (2004): THEORIST ON GRIEF DIES AT 78: DR ELIZABETH KUBLER-ROSS DIES AT 78:  [New Orleans Times-Picayune: Aug 26, 2004: The Associated Press] ELISABETH KUBLER-ROSS DIES AT AGE 78 ON AUGUST 24, 2004: [From Elisabeth Kubler-Ross website: http://www.elisabethkublerross.com/ ]: (Taken from a seminar manuscript "Dying, Death and Grief"  By Chaplain Paul G. Durbin, Ph.D.) From the Book of Ecclesiastes, the 5th verse of the 9th chapter, we read, "For the living know that they shall die." Life is but a short journey from the cradle to the grave. For some death comes early in life, for others in the middle years and for some it comes with old age. Whatever period of life death occurs, it comes to all. Death is the great equalizer for it comes to the rich and poor, the loved and unloved, the happy and the sad, to the male and female, the good and the bad. In some cases death can be postponed or delayed, but eventually it comes to all. None of us are exempt as we realize that one day, we too must die. Dying, death and bereavement are fundamental and pervasive aspects of the human experience. We can only achieve fullness of living by understanding and appreciating these realities. The absence of such understanding and appreciation may result in unnecessary suffering, loss of dignity, alienation and diminished quality of living. Though education about dying, death and bereavement should be......

Words: 1192 - Pages: 5

Anonymous Company

...Case Study: Anonymous Company Eo Martin is a production manager for Anonymous Company, and he is very concerned about the way the company currently control its production. The method used is a manual in which job order tickets are written and production progress is followed through the shop by production expenditers. A number of scheduling and load charts are used to enable the production control people to record and visually observe order progress. This method worked fine during the early years of the firm. When there were very few employees and the production manager could keep information about the few in-process jobs in her head. Mr. Martin is one of the original employee of Anonymous and can remember their original “shop” in the garage of Martin Masilungan, company founder and current president. Mr. Masilungan had designed several unique digital control devices for the petroleum industry during the late 1970’s, and these systems were the first products of the company. Because of the company continuing success, the firm has had to move twice to a larger production facilities during the past 15 years. The company now has an extensive product line and many customers for digital control devices, which are used in both the continuous process and discrete product industries. In process inventory is extensive and raw material storage has been enlarged twice during the past five years. Mr. Martin feels that the current production control methods are just not adequate for......

Words: 1307 - Pages: 6

Srs for Rto

...holders. o To provide user friendly environment. o To reduce error during manual registration. o To complete registration during purchase of vehicle itself. 1.3 Definitions, Acronyms, Abbreviations SRS - Software Requirements Specification. GUI- Graphical User Interface RTO-Regional Transport Office 1.4 REFERENCES Appendix C: Generation of license 1.5 OVERVIEW Project Overview The following subsections provide the complete overview of the software specifications requirements documentation for the regional transport office. The entire SRS is documented in view of User and the following sub sections are arranged to give a complete outlook of the software, its perspective, features, system requirements and users know how it is. 2. Overall description 2.1 Product perspective The system is aimed to automate the major processes in the Regional Transport Office. · Registration of vehicle through online. · Fancy number selection of vehicles through online. · Issue of information’s about license, which include application forms, demo of leaner’s license test and other information’s. · It help’s traffic police for tracing particular vehicle’s. · It help’s for public awareness. . Separate account for the license holders and police. . Provide mail alerts for users about license expiry. ......

Words: 1356 - Pages: 6

Srs User Prmission Doc

...and there is an open transaction, .ACTION – will be run implicitly. If the program crashes, all changes made to the database will be rolled back. This guarantees data consistency. When a sales order is saved, a record should be created in an additional database for every line of the sales order. Both parts, "saving the sales order" and "creating the records", belong together. The bundling of the write accesses which belong together using the .ACTION command increases the comprehensibility and the readability of the program. • Write access and user inputs which are interlinked: ©ABAS Software AG 2005 Know how using abas Business Software Page 4 February 2006/2006r2n01 FOP Programming The commands from A to Z ______________________________________________________________________________________ Interlinked write accesses should be carried out as soon as possible and, if possible, should not contain any user input. If the user should be queried, this can be done without causing any problems before the beginning of the interlinking. • Interlinked write access and : If interlinked write accesses are contained in a FOP, this paragraph should generally be processes with a cancel lock, i.e. with the command .SET CANCEL - or .SET CANCEL --. This is, however, at the discretion of the FOP programmer. When the .ACTION command is carried out, the current status will be retained. When transaction is started, each FOP is allowed. Proper usage of .ACTION: .ACTION generally......

Words: 31215 - Pages: 125

Srs Template

...Index : Technical Specification Sections Finalised by SRS Commiittee for Restructured APDRP under 11th Plan Page-1 Section – G1 :: General Technical requirements Sl. No. Title Page No. / Section No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Introduction Intent of specification Scope of work Other Services and Items Specific Exclusions Utility’s Current IT Infrastructure Arrangement by the Contractor Software tools Warranty, operational guarantee and system reliability with ‘on-site’ support Annual Maintenance Contract Price Loading for Evaluation of Bids Payment terms Project synopsis Bid Schedule Basic reference drawings Spares Time schedule Implementation schedule Quality assurance plan Qualifying requirements 2 of G1 2 of G1 4 of G1 19 of G1 23 of G1 23of G1 23of G1 24 of G1 24 of G1 26 of G1 26 of G1 27 of G1 27 of G1 27 of G1 27 of G1 27 of G1 28 of G1 28 of G1 28 of G1 29 of G1 Page-2 Section – G2 :: Technical specification requirements for Application Packages Sl. No. Title Page No. / Section No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Part-A – Essentially Required by most Utilities for setting up an IT backbone for collection of baseline data, Energy Accounting / Auditing and establishment of Customer care centers Introduction System Functionality Module : Meter Data Acquisition Module : Energy Audit Module : New Connection Module : Disconnection & Dismantling Module : GIS based customer Indexing and asset mapping......

Words: 90558 - Pages: 363

The Anonymous Caller

...Memorandum To:! From:! Date:! ! ! ! Subject:! Case 3.3 — The Anonymous caller! INTRODUCTION: The purpose of this memo is to provide guidance to the anonymous caller, examine issues related to aggressive accounting and financial statement fraud, and provide descriptions of the conditions within the fraud triangle. In providing guidance to the Anonymous caller, we will compare the risks between resigning immediately and staying with the current company. Further, we will discuss other sources of advice for the caller, including legal advice and the State Board of Accountancy. In examining aggressive accounting and financial statement fraud: we will discuss the prevalence of such acts, the pressures put on accountants to perform such acts, and how to determine whether these acts are in accordance with GAAP. The conditions within the fraud triangle are: an incentive to engage in fraud, an opportunity to commit fraud, and an attitude to rationalize the conduct of fraud. We will describe the conditions that existed in the case of the anonymous caller. THE ANONYMOUS CALLER: In this situation, the anonymous caller has recently started working for a small, privatelyheld company and the executives of the company are giving their bank potentially fraudulent financial statements in order to extend their line of credit. The first action the caller should make is to meet with the executives again. The executives have no accounting background, and may not be aware of the considerable risks...

Words: 1101 - Pages: 5

Hms Srs

...Interfaces 5 2.2 Product Functions 5 2.3 User Characteristics 6 2.4 Apportioning of Requirements. 6 2.5 Assumptions and Dependencies 6 3 Specific Requirements 7 3.1 External Interfaces 7 3.1.1 User Interfaces 7 3.1.2 Software Interfaces 7 3.1.3 Hardware Interfaces 7 3.1.4 Communication Interfaces 8 3.2 Functional Requirements 8 3.3 Nonfunctional Requirements 100 3.3.1 Performance Requirements 100 3.3.2 Logical Database Requirements 100 3.3.3 Design Constraints 111 3.3.4 Standards Compliance 111 3.3.5 Reliability 111 3.3.6 Availability 111 3.3.7 Security 111 3.3.8 Maintainability 11 3.3.9 Portability 111 4 Change Management Process 122 5 Document Approvals 122 5.1 Team One Approval 122 5.2 Team Two Approval 122 6 Supporting Information 122 Introduction The following subsections of the Software Requirements Specifications (SRS) document provide an overview of the entire SRS. 1 Purpose The Software Requirements Specification (SRS) will provide a detailed description of the requirements for the Hotel Management System (HMS). This SRS will allow for a complete understanding of what is to be expected of the HMS to be constructed. The clear understanding of the HMS and its’ functionality will allow for the correct software to be developed for the end user and will be used for the......

Words: 2464 - Pages: 10

Sr Corporation

...MK609 - Marketing Case Analysis for SR Corporation: Decisions for an Emerging Technology October 7, 2009 Introduction SR Corp was formed in 1986 to develop and commercialize advanced speech recognition technology. The company's mission was to deploy a new generation of speech transaction technologies, products, and systems that could be easily integrated into telephone and computer networks. The company's goal was to become the leader in a new realm of human communications. SR Corp was financed by private investors. For the past eight years the company focused on developing its core technologies of large-scale speech recognition systems. SR Corp based their solution requirements on feedback from large companies in their target market segment. The solutions developed by SR Corp are targeted at three distinct niches within the telephony segment of the speech recognition market: • Fortune 500 corporations • Telephone companies • Telephone switch OEM's Each niche market provides both opportunities and risks. SR Corp products have shown to be much further advanced then the leading market research firms and industry experts expected at this point in time. The company also had several other advantages including: • Seven US and foreign patents with other pending that will be in force into the next century • SR Corp technology is different then AT&T and other larger competitors • The product and solutions are......

Words: 2245 - Pages: 9

Srs Doc.

...E-Store Project Software Requirements Specification Version Revision History |Date |Version |Description |Author | | | |SRS 1.0 |Group-1 | | | |SRS 2.0 |Group-1 | | | |SRS 3.0 |Group-1 | | | |SRS 4.0 |Group-1 | Table of Contents 1. Introduction 5 1.1 Purpose 5 1.2 Scope 5 1.3 Definitions, Acronyms, and Abbreviations 6 1.4 References 6 1.5 Overview 6 2. Overall Description 6 3. Specific Requirements 7 3.1 Functionality 7 3.1.1 Sell Configured to Ordered Products. 7 3.1.2 Provide comprehensive product details. 7 3.1.3 Detailed product Categorizations 7 3.1.4 Provide Search facility. 7 3.1.5 Maintain customer profile. 8 3.1.6 Provide personalized profile 8 3.1.7 Provide Customer Support. 8 3.1.8 Email confirmation. 9 3.1.9 Detailed invoice for customer. 9 3.1.10 Provide shopping cart facility. 9 3.1.11 Provide multiple......

Words: 2870 - Pages: 12

Anonymous

...We are Anonymous. We are powerful. Is it right for one group of people to have enough power to ruin a person’s life or to over throw governments? You can see a perfect example of this if you look at the situation in Ferguson, Missouri when the hacking community known as Anonymous recently threated to release the personal info on the officer involved in the shooting of the unarmed teenager Michael Brown if the violence on the protesters was not stopped. To answer this question someone has to taking into consideration is the reason morally acceptable, the responsibility behind the power, and if it is socially acceptable. To begin with is it morally acceptable to use the power available to possibly cause the death of another human. One would have to look at the situation that caused the threat to take place. Some may say that it would be right for Anonymous to use the power at hand to bring vengeance to the brutal death of Michael Brown. On the other hand some may say that the death of one should not be an excuse to cause the death of another. But in the end the one with all the power has to be the judge of what is morally acceptable because they are the ones with all the power to determine if the one responsible for Michael Brown’s death deserves to die. Additional, the responsibility of Anonymous to use the power they have in the right way and not to use the information in a destructive way. This somewhat ties into the morally acceptability of the problem at hand but......

Words: 603 - Pages: 3

Alcoholics Anonymous

...Alcoholics Anonymous is and organized group of people who commonly share the same problem in regard to excessive drinking. AA’s only requirement to enter into the program is that you must want to stop drinking. Of course there are AA membership fees that you will have to pay in order to remain a member. The main goal and purpose of this program is to maintain sobriety without any relapse. This program has proven that it is effective however if the person entering the program is not committed to getting better nine times out of ten he or she will not gain sobriety. (Ragels, 2011) A five percent success rate is nothing more than a spontaneous remission in alcohol addiction. Out of any given group of alcoholics, approximately five percent per year will quit. They get tired of being tired and cannot handle the stress that follows from watching their friends die from the same thing. If one should enter into this program you will learn the twelve steps of Alcohol Anonymous. These steps are the bread and butter for obtaining sobriety in the Alcohol Anonymous 12 Step Program. (Orange, 2011) 1. You must admit that you where powerless and that your life was unmanageable. 2. You believe that that a much higher power greater than your self could restore your sanity. 3. Your will and your life are to be turned over to the care of God. 4. Searching and fearless moral recollection of ourselves. 5. Admit the exact nature of your wrongs. 6. Ready to have all defects...

Words: 585 - Pages: 3

Anonymous

...Emergence of a Freedom of Information Movement: Anonymous, WikiLeaks, the Pirate Party, and Iceland – Jessica L. Beyer Key words: Activism, File Sharing, Politics, Hacktivism, New Media, Online Communities http://www.youtube.com/watch?v=gMxhIfG0MpY – 0:00-1:16 | 2:10-3:20 How do you guys feel about the government's interference within ideas of “Freedom of Information”? Are copyright acts more about the broader ideas of controlling information, or more-so the ability to protect people's information and original content? Do you think the youth, anonymous, and people like Kim DotCom are to blame for copyright infringement? How can freedom of information exist alongside copyright? He is knowingly hosting this website whilst people pirate. What kind of message is the US government sending to the world with the Kim DotCom raid? An over the top, 72-person raid on a single lot of land, occupied by one person who is simply hosting a website. Are ISP's as equal to blame as Kim DotCom is? They are allowing this file sharing to happen, since they profit off of the traffic. Should Denial-Of-Service attacks be viewed as protest, or criminal activity? Are they akin to a peaceful protest of not allowing entry to a workplace/space, or are they more in line with rioting which does have criminal activity, and criminal punishment attached to it? Is WikiLeaks committing criminal activity? They are releasing private, government documents, and allowing for this free flow......

Words: 2058 - Pages: 9

Users

...------------------------------------------------- Investers Present and potential owners (investors) are prime users of financial statements. They continually assess and compare the prospects of alternative investments. The assessment of each investment is often based on two variables: expected return and risk. Expected return refers to the increase in the investor’s wealth that is expected over the investment’s time horizon. This wealth increase is comprised of two parts: (1) increases in the market value of the investment and (2) dividends (periodic cash distributions from the firm to its owners). Both of these sources of wealth depend on the firm’s ability to generate cash. Accordingly, financial statements can improve decision making by providing information that helps current and potential investors estimate a firm’s future cash flows. Risk refers to the uncertainty surrounding estimates of expected return. The term expected implies that the return is not guaranteed. For most investments, numerous alternative future returns are possible. For example, an investor may project that a firm’s most likely return for the upcoming year is $100,000. However, the investor recognizes that this is not the only possibility. There is some chance that the firm might generate returns of $90,000 or $110,000. Still other possibilities might be $80,000 and $120,000. The greater the difference among these estimates, the greater the risk. Financial statements help investors assess risk by......

Words: 1348 - Pages: 6

Narcotics Anonymous

...Narcotics Anonymous This paper is written as a personal experience. Someone very close to me was a drug addict. No matter how I begged, pleaded, or threatened, drugs remained the primary driving force in this person life. I was on an emotional rollercoaster and I desperately wanted off. I had come to realize that until that person wanted help nothing could be done. I finally got the strength to leave. I felt guilty because I left without telling the person I was gone. Everyone worries about the addict, but what about the other people involved in the addict’s life. After agonizing for several months, I finally asked for help. I found and joined the local Nar-anon group and it changed my life. Many people are familiar with Al-Anon, but few people even know or have heard about Nar-Anon. According to Nar- Anon, “the program is designed for those who know or have known a feeling of desperation due to the addiction problem of someone close to them” (2011). I become interested in the meeting and decided to attend. It was very hard at first to find out any information about the group, since I came from a small town. I found churches and different organizations that offered AA, NA, and Al-Anon meetings. I finally contacted the local newspaper and they pointed me in the right direction. I was surprised that finding the group would be so difficult, because there were many known drug addicts in my area. I had to travel across town to attend a meeting. I was nervous......

Words: 757 - Pages: 4

Максим Фадеев & MOLLY | Wing Commander Academy (13) | windev mobile 23