Software requirements and architecture modeling for evolving non-secure applications into secure applications
نویسندگان
چکیده
منابع مشابه
Simulating and Modeling Secure e-Business Applications
Characterizing application servers performance becomes a hard work when the system is unavailable or when spending a great amount of time and resources is required to generate the results. In this paper we propose the modelization and simulation of complex systems, such as application servers, in order to alleviate this limitation. Using simulation, and specifically coarse-grain simulation as w...
متن کاملSimulating and Modeling Secure Web Applications
Characterizing application servers performance becomes hard work when the system is unavailable or when a great amount of time and resources are required to generate the results. In this paper we propose the modelingand simulationof complex systems, suchas application servers, in order to alleviate this limitation.Using simulations, and specifically coarsegrain simulations as we propose here, a...
متن کاملUltra Low Power Symmetric Pass Gate Adiabatic Logic with CNTFET for Secure IoT Applications
With the advent and development of the Internet of Things, new needs arose and more attention was paid to these needs. These needs include: low power consumption, low area consumption, low supply voltage, higher security and so on. Many solutions have been proposed to improve each one of these needs. In this paper, we try to reduce the power consumption and enhance the security by using SPGAL, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science of Computer Programming
سال: 2007
ISSN: 0167-6423
DOI: 10.1016/j.scico.2006.10.009