The criteria for selecting the specific systems are - containment of most common sources for attacks, knowledge of the exact location of each security hole, accessibility to the source code and selection of a typical web application such as a human resource management. We followed the human resource (recruiting and working procedure) to integrate all the facilities in a single programmable platform. The applied framework has been used to map a commercial security library to the target mobile application SoC (System-of-Chip). The applicability of our framework to software architecture has been explored in other multiprocessor scenarios. ERP software (or enterprise resource planning software) is an integrated system used by businesses to combine, organize and maintain the data necessary for operations. The fundamental advantage of ERP is that integrating the myriad processes by which businesses operate saves time and expenses. The whole process has been automated using a methodology that extracts the risk of ERP system by analyzing the class diagram of the system. ERP for the business to develop innovative services for new and existing organizations, has achieved operational excellence with streamlined logistics and manufacturing improve financial performance with tighter internal controls and insights connect headquarters, subsidiaries and partners in a single network. Any type of small and large organization who to maintain their work flow in an organized way and having an intensity of clear book keeping like as business & educational institutions as well as social organizations.
Published in | International Journal of Intelligent Information Systems (Volume 3, Issue 5) |
DOI | 10.11648/j.ijiis.20140305.11 |
Page(s) | 45-54 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2014. Published by Science Publishing Group |
ERP, SecureCL, Trigger, Cursor etc
[1] | Voas, “Certifying Software for High-Assurance Envi-ronments,” IEEE Software, vol. 16, no. 4, July/Aug.1999, pp. 48–54. |
[2] | W. Councill, “Third-Party Testing and the Quality of Software Components,” IEEE Software, vol. 16, no. 4, July/Aug. 1999, pp. 55–57. |
[3] | A. Ghosh and G. McGraw, “An Approach for Certify- ing Security in Software Components,” Proc. 21st Nat’l Information Systems Security Conf., Nat’l Inst. Stan- dards and Technology, Crystal city, Vir., 1998, pp.82–86. |
[4] | ISO/IEC-15408 (1999), Common Criteria for Informa- tion Technology Security Evaluation, v2.0, Nat’l Inst. Standards and Technology, Washington, DC, June1999, http://csrc.nist.gov/cc. (current Dec. 2001) |
[5] | K. Khan, J. Han, and Y. Zheng, “A Framework for an Active Interface to Characterize Compositional Security Contracts of Software Components,” Proc. Australian Software Eng. Conf., IEEE CS Press, Los Alamitos, Calif., 2001, pp. 117–126. |
[6] | C.A. Berry, J. Carnell, M.B. Juric, M.M. Kunnumpurath, N. Nashi, and S. Romanosky, J2EE Design Patterns Applied. Wrox Press, 2002. |
[7] | Blakley, C. Heath, and Members of the Open Group SecurityForum, Security Design Patterns: Open Group Technical Guide, 2004. |
[8] | Braga, C. Rubira, and R. Dahab, “Tropyc: A Pattern Language for Cryptographic Software,” Proc. Fifth Conf. Pattern Languages of Programming (PLoP), 1998. |
[9] | P.J. Brooke and R.F. Paige, “Fault Trees for Security SystemDesign and Analysis,” Computers and Security, vol. 22, no. 3, pp. 256-264, Apr. 2003. |
[10] | K.-Y. Cai, Introduction to Fuzzy Reliability. Kluwer AcademicPublishers, 1996. |
[11] | K.-Y. Cai, “System Failure Engineering and Fuzzy Methodology: An Introductory Overview,” Fuzzy Sets and Systems, vol. 83, no. 2,pp. 113-133, Oct. 1996. |
APA Style
Diponkar Paul, Md. Rafel Mridha, Md. Rashedul Hasan. (2014). Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System. International Journal of Intelligent Information Systems, 3(5), 45-54. https://doi.org/10.11648/j.ijiis.20140305.11
ACS Style
Diponkar Paul; Md. Rafel Mridha; Md. Rashedul Hasan. Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System. Int. J. Intell. Inf. Syst. 2014, 3(5), 45-54. doi: 10.11648/j.ijiis.20140305.11
AMA Style
Diponkar Paul, Md. Rafel Mridha, Md. Rashedul Hasan. Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System. Int J Intell Inf Syst. 2014;3(5):45-54. doi: 10.11648/j.ijiis.20140305.11
@article{10.11648/j.ijiis.20140305.11, author = {Diponkar Paul and Md. Rafel Mridha and Md. Rashedul Hasan}, title = {Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System}, journal = {International Journal of Intelligent Information Systems}, volume = {3}, number = {5}, pages = {45-54}, doi = {10.11648/j.ijiis.20140305.11}, url = {https://doi.org/10.11648/j.ijiis.20140305.11}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijiis.20140305.11}, abstract = {The criteria for selecting the specific systems are - containment of most common sources for attacks, knowledge of the exact location of each security hole, accessibility to the source code and selection of a typical web application such as a human resource management. We followed the human resource (recruiting and working procedure) to integrate all the facilities in a single programmable platform. The applied framework has been used to map a commercial security library to the target mobile application SoC (System-of-Chip). The applicability of our framework to software architecture has been explored in other multiprocessor scenarios. ERP software (or enterprise resource planning software) is an integrated system used by businesses to combine, organize and maintain the data necessary for operations. The fundamental advantage of ERP is that integrating the myriad processes by which businesses operate saves time and expenses. The whole process has been automated using a methodology that extracts the risk of ERP system by analyzing the class diagram of the system. ERP for the business to develop innovative services for new and existing organizations, has achieved operational excellence with streamlined logistics and manufacturing improve financial performance with tighter internal controls and insights connect headquarters, subsidiaries and partners in a single network. Any type of small and large organization who to maintain their work flow in an organized way and having an intensity of clear book keeping like as business & educational institutions as well as social organizations.}, year = {2014} }
TY - JOUR T1 - Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System AU - Diponkar Paul AU - Md. Rafel Mridha AU - Md. Rashedul Hasan Y1 - 2014/11/20 PY - 2014 N1 - https://doi.org/10.11648/j.ijiis.20140305.11 DO - 10.11648/j.ijiis.20140305.11 T2 - International Journal of Intelligent Information Systems JF - International Journal of Intelligent Information Systems JO - International Journal of Intelligent Information Systems SP - 45 EP - 54 PB - Science Publishing Group SN - 2328-7683 UR - https://doi.org/10.11648/j.ijiis.20140305.11 AB - The criteria for selecting the specific systems are - containment of most common sources for attacks, knowledge of the exact location of each security hole, accessibility to the source code and selection of a typical web application such as a human resource management. We followed the human resource (recruiting and working procedure) to integrate all the facilities in a single programmable platform. The applied framework has been used to map a commercial security library to the target mobile application SoC (System-of-Chip). The applicability of our framework to software architecture has been explored in other multiprocessor scenarios. ERP software (or enterprise resource planning software) is an integrated system used by businesses to combine, organize and maintain the data necessary for operations. The fundamental advantage of ERP is that integrating the myriad processes by which businesses operate saves time and expenses. The whole process has been automated using a methodology that extracts the risk of ERP system by analyzing the class diagram of the system. ERP for the business to develop innovative services for new and existing organizations, has achieved operational excellence with streamlined logistics and manufacturing improve financial performance with tighter internal controls and insights connect headquarters, subsidiaries and partners in a single network. Any type of small and large organization who to maintain their work flow in an organized way and having an intensity of clear book keeping like as business & educational institutions as well as social organizations. VL - 3 IS - 5 ER -