Software requirements and architecture modeling for evolving non-secure applications into secure applications

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Simulating and Modeling Secure e-Business Applications

Characterizing application servers performance becomes a hard work when the system is unavailable or when spending a great amount of time and resources is required to generate the results. In this paper we propose the modelization and simulation of complex systems, such as application servers, in order to alleviate this limitation. Using simulation, and specifically coarse-grain simulation as w...

متن کامل

Simulating and Modeling Secure Web Applications

Characterizing application servers performance becomes hard work when the system is unavailable or when a great amount of time and resources are required to generate the results. In this paper we propose the modelingand simulationof complex systems, suchas application servers, in order to alleviate this limitation.Using simulations, and specifically coarsegrain simulations as we propose here, a...

متن کامل

Ultra Low Power Symmetric Pass Gate Adiabatic Logic with CNTFET for Secure IoT Applications

With the advent and development of the Internet of Things, new needs arose and more attention was paid to these needs. These needs include: low power consumption, low area consumption, low supply voltage, higher security and so on. Many solutions have been proposed to improve each one of these needs. In this paper, we try to reduce the power consumption and enhance the security by using SPGAL, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science of Computer Programming

سال: 2007

ISSN: 0167-6423

DOI: 10.1016/j.scico.2006.10.009