Title | Autonomous Application in Requirements Analysis of Information System Development for Producing a Design Model |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | R, Prasath, Rajan, Rajesh George |
Conference Name | 2021 2nd International Conference on Communication, Computing and Industry 4.0 (C2I4) |
Keywords | Complexity theory, composability, Computing Theory, convolution neural network, dynamic, Human Behavior, Key Management, Network security, Organizations, Programming, pubcrawl, resilience, Resiliency, Safety, swarm intelligence, Technological innovation, telecommunication computing, Trust, Trusted Computing |
Abstract | The main technology of traditional information security is firewall, intrusion detection and anti-virus software, which is used in the first anti-outer defence, the first anti-service terminal defence terminal passive defence ideas, the complexity and complexity of these security technologies not only increase the complexity of the autonomous system, reduce the efficiency of the system, but also cannot solve the security problem of the information system, and cannot satisfy the security demand of the information system. After a significant stretch of innovative work, individuals utilize the secret word innovation, network security innovation, set forward the idea "confided in figuring" in view of the equipment security module support, Trusted processing from changing the customary protection thoughts, center around the safety efforts taken from the terminal to forestall framework assaults, from the foundation of the stage, the acknowledgment of the security of data frameworks. Believed figuring is chiefly worried about the security of the framework terminal, utilizing a progression of safety efforts to ensure the protection of clients to work on the security of independent frameworks. Its principle plan thought is implanted in a typical machine to oppose altering the equipment gadget - confided in stage module as the base of the trust, the utilization of equipment and programming innovation to join the trust of the base of trust through the trust bind level to the entire independent framework, joined with the security of information stockpiling insurance, client validation and stage respectability of the three significant safety efforts guarantee that the terminal framework security and unwavering quality, to guarantee that the terminal framework is consistently in a condition of conduct anticipated. |
DOI | 10.1109/C2I454156.2021.9689440 |
Citation Key | r_autonomous_2021 |