Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System
International Journal of Intelligent Information Systems
Volume 3, Issue 5, October 2014, Pages: 45-54
Received: Aug. 4, 2014;
Accepted: Aug. 28, 2014;
Published: Nov. 20, 2014
Views 3388 Downloads 183
Diponkar Paul, Department of EEE, Prime University, Mirput-1, Dhaka, Bangladesh
Md. Rafel Mridha, World University of Bangladesh, Dhanmondi, Dhaka, Bangladesh
Md. Rashedul Hasan, World University of Bangladesh, Dhanmondi, Dhaka, Bangladesh
The criteria for selecting the specific systems are - containment of most common sources for attacks, knowledge of the exact location of each security hole, accessibility to the source code and selection of a typical web application such as a human resource management. We followed the human resource (recruiting and working procedure) to integrate all the facilities in a single programmable platform. The applied framework has been used to map a commercial security library to the target mobile application SoC (System-of-Chip). The applicability of our framework to software architecture has been explored in other multiprocessor scenarios. ERP software (or enterprise resource planning software) is an integrated system used by businesses to combine, organize and maintain the data necessary for operations. The fundamental advantage of ERP is that integrating the myriad processes by which businesses operate saves time and expenses. The whole process has been automated using a methodology that extracts the risk of ERP system by analyzing the class diagram of the system. ERP for the business to develop innovative services for new and existing organizations, has achieved operational excellence with streamlined logistics and manufacturing improve financial performance with tighter internal controls and insights connect headquarters, subsidiaries and partners in a single network. Any type of small and large organization who to maintain their work flow in an organized way and having an intensity of clear book keeping like as business & educational institutions as well as social organizations.
Md. Rafel Mridha,
Md. Rashedul Hasan,
Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System, International Journal of Intelligent Information Systems.
Vol. 3, No. 5,
2014, pp. 45-54.
Voas, “Certifying Software for High-Assurance Envi-ronments,” IEEE Software, vol. 16, no. 4, July/Aug.1999, pp. 48–54.
W. Councill, “Third-Party Testing and the Quality of Software Components,” IEEE Software, vol. 16, no. 4, July/Aug. 1999, pp. 55–57.
A. Ghosh and G. McGraw, “An Approach for Certify- ing Security in Software Components,” Proc. 21st Nat’l Information Systems Security Conf., Nat’l Inst. Stan- dards and Technology, Crystal city, Vir., 1998, pp.82–86.
ISO/IEC-15408 (1999), Common Criteria for Informa- tion Technology Security Evaluation, v2.0, Nat’l Inst. Standards and Technology, Washington, DC, June1999, http://csrc.nist.gov/cc. (current Dec. 2001)
K. Khan, J. Han, and Y. Zheng, “A Framework for an Active Interface to Characterize Compositional Security Contracts of Software Components,” Proc. Australian Software Eng. Conf., IEEE CS Press, Los Alamitos, Calif., 2001, pp. 117–126.
C.A. Berry, J. Carnell, M.B. Juric, M.M. Kunnumpurath, N. Nashi, and S. Romanosky, J2EE Design Patterns Applied. Wrox Press, 2002.
Blakley, C. Heath, and Members of the Open Group SecurityForum, Security Design Patterns: Open Group Technical Guide, 2004.
Braga, C. Rubira, and R. Dahab, “Tropyc: A Pattern Language for Cryptographic Software,” Proc. Fifth Conf. Pattern Languages of Programming (PLoP), 1998.
P.J. Brooke and R.F. Paige, “Fault Trees for Security SystemDesign and Analysis,” Computers and Security, vol. 22, no. 3, pp. 256-264, Apr. 2003.
K.-Y. Cai, Introduction to Fuzzy Reliability. Kluwer AcademicPublishers, 1996.
K.-Y. Cai, “System Failure Engineering and Fuzzy Methodology: An Introductory Overview,” Fuzzy Sets and Systems, vol. 83, no. 2,pp. 113-133, Oct. 1996.