Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/183649
Title: Mining and SPF based Roundtrip Engineering for The Development of Web Applications
Researcher: Pathak. Nitish
Guide(s): Sharma. Girish, Kumar
Keywords: Class identification and modeling, Roundtrip Engineering, Trusted Operating Systems, Model Driven Software Development, Code generation, Re-implementation and Re-engineering Language translation
University: Uttarakhand Technical University
Completed Date: 1-6-2017
Abstract: newline newlineThis thesis proposes experimental support to secure Round Trip Engineering and use of security performance flexibility trusted operating systems for the designing of secure web applications. In this thesis, we propose source code generation from object models through IBM Rational Rose software, Class identification and Modeling for web applications through UML. Through which, we develop the understanding level of complex software, developers can identify software Metrics like no. of data member per class, data structure metrics, coupling between objects, information flow etc. Further we propose Security Performance flexibility model for the same to maintain the balance between security and performance for web applications. The novel integration of security engineering with model driven Software expansion approach is being used in this thesis. newline newline newline In this thesis, for security concern, we suggest use of trusted operating systems as a platform to run these web applications. For improving the performance of same web applications, we observe that all security checks in a Trusted Operating System are not necessary. As per our suggestion, various unnecessary security checks can be skipped by administrator, so that system performance of these web applications can improve. These unnecessary security checks, system calls and operations can be easily identified at the time of requirement elicitation and Requirement Engineering. For example, as we know, the popular web servers deal with public information. In this web application, the need for security checks during reads from disk seems like a waste of CPU cycles. On the other hand the real security need for servers seems to be of the write accesses. The observation and selection of necessary operations, member functions, data member and system calls will vary from one application to next. newline newline newline
Pagination: 187 pages
URI: http://hdl.handle.net/10603/183649
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01-title page.pdfAttached File92.86 kBAdobe PDFView/Open
02- certificate.pdf454.24 kBAdobe PDFView/Open
03-contents.pdf100.67 kBAdobe PDFView/Open
04-list of tables.pdf93.95 kBAdobe PDFView/Open
05-list of figures.pdf95.17 kBAdobe PDFView/Open
06-acknowledgement.pdf98.5 kBAdobe PDFView/Open
07-chapter 1.pdf257.88 kBAdobe PDFView/Open
08- chapter 2.pdf174.51 kBAdobe PDFView/Open
09-chapter 3.pdf339.16 kBAdobe PDFView/Open
10-chapter 4.pdf2.48 MBAdobe PDFView/Open
11- chapter 5.pdf226.04 kBAdobe PDFView/Open
12-chapter 6.pdf106.19 kBAdobe PDFView/Open
13-appendix.pdf173.72 kBAdobe PDFView/Open
14-references.pdf248.96 kBAdobe PDFView/Open
15- publication.pdf17.31 kBAdobe PDFView/Open


Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.