Visible to the public Autonomous Application in Requirements Analysis of Information System Development for Producing a Design Model

TitleAutonomous Application in Requirements Analysis of Information System Development for Producing a Design Model
Publication TypeConference Paper
Year of Publication2021
AuthorsR, Prasath, Rajan, Rajesh George
Conference Name2021 2nd International Conference on Communication, Computing and Industry 4.0 (C2I4)
KeywordsComplexity theory, composability, Computing Theory, convolution neural network, dynamic, Human Behavior, Key Management, Network security, Organizations, Programming, pubcrawl, resilience, Resiliency, Safety, swarm intelligence, Technological innovation, telecommunication computing, Trust, Trusted Computing
AbstractThe main technology of traditional information security is firewall, intrusion detection and anti-virus software, which is used in the first anti-outer defence, the first anti-service terminal defence terminal passive defence ideas, the complexity and complexity of these security technologies not only increase the complexity of the autonomous system, reduce the efficiency of the system, but also cannot solve the security problem of the information system, and cannot satisfy the security demand of the information system. After a significant stretch of innovative work, individuals utilize the secret word innovation, network security innovation, set forward the idea "confided in figuring" in view of the equipment security module support, Trusted processing from changing the customary protection thoughts, center around the safety efforts taken from the terminal to forestall framework assaults, from the foundation of the stage, the acknowledgment of the security of data frameworks. Believed figuring is chiefly worried about the security of the framework terminal, utilizing a progression of safety efforts to ensure the protection of clients to work on the security of independent frameworks. Its principle plan thought is implanted in a typical machine to oppose altering the equipment gadget - confided in stage module as the base of the trust, the utilization of equipment and programming innovation to join the trust of the base of trust through the trust bind level to the entire independent framework, joined with the security of information stockpiling insurance, client validation and stage respectability of the three significant safety efforts guarantee that the terminal framework security and unwavering quality, to guarantee that the terminal framework is consistently in a condition of conduct anticipated.
DOI10.1109/C2I454156.2021.9689440
Citation Keyr_autonomous_2021