International Journal of Intelligent Information Systems

| Peer-Reviewed |

Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System

Received: 04 August 2014    Accepted: 28 August 2014    Published: 20 November 2014
Views:       Downloads:

Share This Article

Abstract

The criteria for selecting the specific systems are - containment of most common sources for attacks, knowledge of the exact location of each security hole, accessibility to the source code and selection of a typical web application such as a human resource management. We followed the human resource (recruiting and working procedure) to integrate all the facilities in a single programmable platform. The applied framework has been used to map a commercial security library to the target mobile application SoC (System-of-Chip). The applicability of our framework to software architecture has been explored in other multiprocessor scenarios. ERP software (or enterprise resource planning software) is an integrated system used by businesses to combine, organize and maintain the data necessary for operations. The fundamental advantage of ERP is that integrating the myriad processes by which businesses operate saves time and expenses. The whole process has been automated using a methodology that extracts the risk of ERP system by analyzing the class diagram of the system. ERP for the business to develop innovative services for new and existing organizations, has achieved operational excellence with streamlined logistics and manufacturing improve financial performance with tighter internal controls and insights connect headquarters, subsidiaries and partners in a single network. Any type of small and large organization who to maintain their work flow in an organized way and having an intensity of clear book keeping like as business & educational institutions as well as social organizations.

DOI 10.11648/j.ijiis.20140305.11
Published in International Journal of Intelligent Information Systems (Volume 3, Issue 5, October 2014)
Page(s) 45-54
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

ERP, SecureCL, Trigger, Cursor etc

References
[1] Voas, “Certifying Software for High-Assurance Envi-ronments,” IEEE Software, vol. 16, no. 4, July/Aug.1999, pp. 48–54.
[2] W. Councill, “Third-Party Testing and the Quality of Software Components,” IEEE Software, vol. 16, no. 4, July/Aug. 1999, pp. 55–57.
[3] A. Ghosh and G. McGraw, “An Approach for Certify- ing Security in Software Components,” Proc. 21st Nat’l Information Systems Security Conf., Nat’l Inst. Stan- dards and Technology, Crystal city, Vir., 1998, pp.82–86.
[4] ISO/IEC-15408 (1999), Common Criteria for Informa- tion Technology Security Evaluation, v2.0, Nat’l Inst. Standards and Technology, Washington, DC, June1999, http://csrc.nist.gov/cc. (current Dec. 2001)
[5] K. Khan, J. Han, and Y. Zheng, “A Framework for an Active Interface to Characterize Compositional Security Contracts of Software Components,” Proc. Australian Software Eng. Conf., IEEE CS Press, Los Alamitos, Calif., 2001, pp. 117–126.
[6] C.A. Berry, J. Carnell, M.B. Juric, M.M. Kunnumpurath, N. Nashi, and S. Romanosky, J2EE Design Patterns Applied. Wrox Press, 2002.
[7] Blakley, C. Heath, and Members of the Open Group SecurityForum, Security Design Patterns: Open Group Technical Guide, 2004.
[8] Braga, C. Rubira, and R. Dahab, “Tropyc: A Pattern Language for Cryptographic Software,” Proc. Fifth Conf. Pattern Languages of Programming (PLoP), 1998.
[9] P.J. Brooke and R.F. Paige, “Fault Trees for Security SystemDesign and Analysis,” Computers and Security, vol. 22, no. 3, pp. 256-264, Apr. 2003.
[10] K.-Y. Cai, Introduction to Fuzzy Reliability. Kluwer AcademicPublishers, 1996.
[11] K.-Y. Cai, “System Failure Engineering and Fuzzy Methodology: An Introductory Overview,” Fuzzy Sets and Systems, vol. 83, no. 2,pp. 113-133, Oct. 1996.
Author Information
  • Department of EEE, Prime University, Mirput-1, Dhaka, Bangladesh

  • World University of Bangladesh, Dhanmondi, Dhaka, Bangladesh

  • World University of Bangladesh, Dhanmondi, Dhaka, Bangladesh

Cite This Article
  • APA Style

    Diponkar Paul, Md. Rafel Mridha, Md. Rashedul Hasan. (2014). Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System. International Journal of Intelligent Information Systems, 3(5), 45-54. https://doi.org/10.11648/j.ijiis.20140305.11

    Copy | Download

    ACS Style

    Diponkar Paul; Md. Rafel Mridha; Md. Rashedul Hasan. Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System. Int. J. Intell. Inf. Syst. 2014, 3(5), 45-54. doi: 10.11648/j.ijiis.20140305.11

    Copy | Download

    AMA Style

    Diponkar Paul, Md. Rafel Mridha, Md. Rashedul Hasan. Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System. Int J Intell Inf Syst. 2014;3(5):45-54. doi: 10.11648/j.ijiis.20140305.11

    Copy | Download

  • @article{10.11648/j.ijiis.20140305.11,
      author = {Diponkar Paul and Md. Rafel Mridha and Md. Rashedul Hasan},
      title = {Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System},
      journal = {International Journal of Intelligent Information Systems},
      volume = {3},
      number = {5},
      pages = {45-54},
      doi = {10.11648/j.ijiis.20140305.11},
      url = {https://doi.org/10.11648/j.ijiis.20140305.11},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.ijiis.20140305.11},
      abstract = {The criteria for selecting the specific systems are - containment of most common sources for attacks, knowledge of the exact location of each security hole, accessibility to the source code and selection of a typical web application such as a human resource management. We followed the human resource (recruiting and working procedure) to integrate all the facilities in a single programmable platform. The applied framework has been used to map a commercial security library to the target mobile application SoC (System-of-Chip). The applicability of our framework to software architecture has been explored in other multiprocessor scenarios. ERP software (or enterprise resource planning software) is an integrated system used by businesses to combine, organize and maintain the data necessary for operations. The fundamental advantage of ERP is that integrating the myriad processes by which businesses operate saves time and expenses. The whole process has been automated using a methodology that extracts the risk of ERP system by analyzing the class diagram of the system. ERP for the business to develop innovative services for new and existing organizations, has achieved operational excellence with streamlined logistics and manufacturing improve financial performance with tighter internal controls and insights connect headquarters, subsidiaries and partners in a single network. Any type of small and large organization who to maintain their work flow in an organized way and having an intensity of clear book keeping like as business & educational institutions as well as social organizations.},
     year = {2014}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System
    AU  - Diponkar Paul
    AU  - Md. Rafel Mridha
    AU  - Md. Rashedul Hasan
    Y1  - 2014/11/20
    PY  - 2014
    N1  - https://doi.org/10.11648/j.ijiis.20140305.11
    DO  - 10.11648/j.ijiis.20140305.11
    T2  - International Journal of Intelligent Information Systems
    JF  - International Journal of Intelligent Information Systems
    JO  - International Journal of Intelligent Information Systems
    SP  - 45
    EP  - 54
    PB  - Science Publishing Group
    SN  - 2328-7683
    UR  - https://doi.org/10.11648/j.ijiis.20140305.11
    AB  - The criteria for selecting the specific systems are - containment of most common sources for attacks, knowledge of the exact location of each security hole, accessibility to the source code and selection of a typical web application such as a human resource management. We followed the human resource (recruiting and working procedure) to integrate all the facilities in a single programmable platform. The applied framework has been used to map a commercial security library to the target mobile application SoC (System-of-Chip). The applicability of our framework to software architecture has been explored in other multiprocessor scenarios. ERP software (or enterprise resource planning software) is an integrated system used by businesses to combine, organize and maintain the data necessary for operations. The fundamental advantage of ERP is that integrating the myriad processes by which businesses operate saves time and expenses. The whole process has been automated using a methodology that extracts the risk of ERP system by analyzing the class diagram of the system. ERP for the business to develop innovative services for new and existing organizations, has achieved operational excellence with streamlined logistics and manufacturing improve financial performance with tighter internal controls and insights connect headquarters, subsidiaries and partners in a single network. Any type of small and large organization who to maintain their work flow in an organized way and having an intensity of clear book keeping like as business & educational institutions as well as social organizations.
    VL  - 3
    IS  - 5
    ER  - 

    Copy | Download

  • Sections