Today, many computers are using to manage many applications, like management of bank accounts, to... more Today, many computers are using to manage many applications, like management of bank accounts, to keep medical records, etc. With the progress of computer science and become more complicated, the amount of threats and risks is also increased strongly and attacks in this area have also been complicated and advanced. Today, with this huge amount of vast and complicated threats and attacks on computer systems, security has very important place, because at any moment the amount of threats and attacks in this area is added and these risks in some cases will have to follow heavy and irreparable damages. In the world of computer, software security is one of the important issues all the time. We are insensitive about the threats to the software that we design most of the time and consider security as a solution after the completion of design and constructing programs. In fact, to avoid creating security problems and deal with security threats and attacks properly we must be prevented about fragmented and temporary activities and our activities should have an appropriate structured process and be raised on a specific standard form in this regard. The important point here is if software should have a secure entity, this only is possible by having a secure architecture. There are various techniques that help to develop secure architecture and software systems. These techniques block hackers' ways to attack the applications. This paper tries to clarify the position and importance of software architecture in order to create secure software systems. Also in this article the role of software architecture in order to provide permanent security for software systems, has been described.
Software complexity is a well known paradigm within the software engineering and one which boasts... more Software complexity is a well known paradigm within the software engineering and one which boasts a rich supply of metrics claiming to be able to define and measure the complexity of software. Within this area, different types of complexity have been identified and defined in an attempt to measure productivity, dependence, testing and maintenance effort. Software complexity has significant impact on cost and time of software development and maintenance. During the recent decades many efforts have been made to measure and control the complexity of software. This paper attempts to demonstrate the complexity which is based on IEEE Requirement Engineering document and impact in reducing the complexity of integrated design software.
2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008
One of important issues in e-learning world is content integrity. The ability to detect changes i... more One of important issues in e-learning world is content integrity. The ability to detect changes in learning contents has been very important for many applications. Content authentication has therefore been one of the most important issues in the e-learning world.
... OPLSW: A New System for Ontology Parable Learning in Semantic Web Navid Kabiri, Nasser Modiri... more ... OPLSW: A New System for Ontology Parable Learning in Semantic Web Navid Kabiri, Nasser Modiri, and NoorAldeen Mirzaee ... 1590, pp. 172183. Springer, Heidelberg (1999) 3. Chai, MK, Ng, HT, Chieu, HL: Bayesian online classifiers for text classification and filtering. ...
Organizations would encounter with challenges which leaving them would be impossible without any ... more Organizations would encounter with challenges which leaving them would be impossible without any systematic and engineering approach and without any preparation of Secure Information System. The most important and greatest challenge is related to security of area that provides Information Systems. The main contribution of this work is providing a security standard-based process for software product line development. It is based on categories vulnerabilities and some concept of software engineering and use of the redefinition of information system life cycle, which integrated by Common Criteria (ISO/IEC 15408) controls into the product line lifecycle. Present approach reduces the complexity and ambiguity inherent in the information systems security in the engineering, well-defined, repeatability process. Thus, the security organizations which implement secure products ensure the security level their product and use time-cost effective and engineering process to improve their future product.
Since SOA adoption will revolutionize an enterprise and its information systems, it is important ... more Since SOA adoption will revolutionize an enterprise and its information systems, it is important for both the IT technicians and the business executives to be careful on the whole process of adoption and post-adoption steps. This paper has investigated how to migrate to SOA. To achieve this goal a roadmap is presented by combining existing roadmaps which has already proposed by the others. This roadmap has eight steps in three levels: management, organizational and components. The steps include strategy, operational planning, organization, design, governance, implementation, monitoring and establishment. It is shown that our roadmap has more advantages in comparison with the existing ones.
Advanced Computing: An International Journal, 2011
Today, one of the new solutions to build organizational systems applications, service-based solut... more Today, one of the new solutions to build organizational systems applications, service-based solution is considered. This paper will attempt to identify with the full service approach we offer Integration. In this method, a process model of organization and inventory lists organizations as inputs received during a three-step process for integrating services organizations are recognized organization. Try this method of communication between services is possible and declined to increase communication within the service.
It is broadly clear that complexity is one of the software natural features. Software natural com... more It is broadly clear that complexity is one of the software natural features. Software natural complexity and software requirement functionality are two inseparable part and they have special range. measurement complexity have explained with using the MacCabe and Halsted models and with an example discuss about software complexity in this paper Flow metric information Henry and Kafura, complexity metric system Agresti-card-glass, design metric in item's level have compared and peruse then categorized object oriented and present a model with 4 level of software complexity.
... Information security management as human challenge studied by Debi ashenden[1]. Problems and ... more ... Information security management as human challenge studied by Debi ashenden[1]. Problems and solutions of information security management studied by Mikko Siponen and Robert Willison [2]. Ebru Yeniman Yildirim studied the impact factors in information security ...
... Fred Halsall Nasser Modiri ... of the Association Control Service Element (ACSE) [9] [ 101&#x... more ... Fred Halsall Nasser Modiri ... of the Association Control Service Element (ACSE) [9] [ 101' application entity to establish an as-sociation with the appropriate LMAE, and then uses the ser-vices provided by a second sublayer, the Remote Operation Service Element (ROSE) [ 1 11 ...
Today, many computers are using to manage many applications, like management of bank accounts, to... more Today, many computers are using to manage many applications, like management of bank accounts, to keep medical records, etc. With the progress of computer science and become more complicated, the amount of threats and risks is also increased strongly and attacks in this area have also been complicated and advanced. Today, with this huge amount of vast and complicated threats and attacks on computer systems, security has very important place, because at any moment the amount of threats and attacks in this area is added and these risks in some cases will have to follow heavy and irreparable damages. In the world of computer, software security is one of the important issues all the time. We are insensitive about the threats to the software that we design most of the time and consider security as a solution after the completion of design and constructing programs. In fact, to avoid creating security problems and deal with security threats and attacks properly we must be prevented about fragmented and temporary activities and our activities should have an appropriate structured process and be raised on a specific standard form in this regard. The important point here is if software should have a secure entity, this only is possible by having a secure architecture. There are various techniques that help to develop secure architecture and software systems. These techniques block hackers' ways to attack the applications. This paper tries to clarify the position and importance of software architecture in order to create secure software systems. Also in this article the role of software architecture in order to provide permanent security for software systems, has been described.
Software complexity is a well known paradigm within the software engineering and one which boasts... more Software complexity is a well known paradigm within the software engineering and one which boasts a rich supply of metrics claiming to be able to define and measure the complexity of software. Within this area, different types of complexity have been identified and defined in an attempt to measure productivity, dependence, testing and maintenance effort. Software complexity has significant impact on cost and time of software development and maintenance. During the recent decades many efforts have been made to measure and control the complexity of software. This paper attempts to demonstrate the complexity which is based on IEEE Requirement Engineering document and impact in reducing the complexity of integrated design software.
2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008
One of important issues in e-learning world is content integrity. The ability to detect changes i... more One of important issues in e-learning world is content integrity. The ability to detect changes in learning contents has been very important for many applications. Content authentication has therefore been one of the most important issues in the e-learning world.
... OPLSW: A New System for Ontology Parable Learning in Semantic Web Navid Kabiri, Nasser Modiri... more ... OPLSW: A New System for Ontology Parable Learning in Semantic Web Navid Kabiri, Nasser Modiri, and NoorAldeen Mirzaee ... 1590, pp. 172183. Springer, Heidelberg (1999) 3. Chai, MK, Ng, HT, Chieu, HL: Bayesian online classifiers for text classification and filtering. ...
Organizations would encounter with challenges which leaving them would be impossible without any ... more Organizations would encounter with challenges which leaving them would be impossible without any systematic and engineering approach and without any preparation of Secure Information System. The most important and greatest challenge is related to security of area that provides Information Systems. The main contribution of this work is providing a security standard-based process for software product line development. It is based on categories vulnerabilities and some concept of software engineering and use of the redefinition of information system life cycle, which integrated by Common Criteria (ISO/IEC 15408) controls into the product line lifecycle. Present approach reduces the complexity and ambiguity inherent in the information systems security in the engineering, well-defined, repeatability process. Thus, the security organizations which implement secure products ensure the security level their product and use time-cost effective and engineering process to improve their future product.
Since SOA adoption will revolutionize an enterprise and its information systems, it is important ... more Since SOA adoption will revolutionize an enterprise and its information systems, it is important for both the IT technicians and the business executives to be careful on the whole process of adoption and post-adoption steps. This paper has investigated how to migrate to SOA. To achieve this goal a roadmap is presented by combining existing roadmaps which has already proposed by the others. This roadmap has eight steps in three levels: management, organizational and components. The steps include strategy, operational planning, organization, design, governance, implementation, monitoring and establishment. It is shown that our roadmap has more advantages in comparison with the existing ones.
Advanced Computing: An International Journal, 2011
Today, one of the new solutions to build organizational systems applications, service-based solut... more Today, one of the new solutions to build organizational systems applications, service-based solution is considered. This paper will attempt to identify with the full service approach we offer Integration. In this method, a process model of organization and inventory lists organizations as inputs received during a three-step process for integrating services organizations are recognized organization. Try this method of communication between services is possible and declined to increase communication within the service.
It is broadly clear that complexity is one of the software natural features. Software natural com... more It is broadly clear that complexity is one of the software natural features. Software natural complexity and software requirement functionality are two inseparable part and they have special range. measurement complexity have explained with using the MacCabe and Halsted models and with an example discuss about software complexity in this paper Flow metric information Henry and Kafura, complexity metric system Agresti-card-glass, design metric in item's level have compared and peruse then categorized object oriented and present a model with 4 level of software complexity.
... Information security management as human challenge studied by Debi ashenden[1]. Problems and ... more ... Information security management as human challenge studied by Debi ashenden[1]. Problems and solutions of information security management studied by Mikko Siponen and Robert Willison [2]. Ebru Yeniman Yildirim studied the impact factors in information security ...
... Fred Halsall Nasser Modiri ... of the Association Control Service Element (ACSE) [9] [ 101&#x... more ... Fred Halsall Nasser Modiri ... of the Association Control Service Element (ACSE) [9] [ 101' application entity to establish an as-sociation with the appropriate LMAE, and then uses the ser-vices provided by a second sublayer, the Remote Operation Service Element (ROSE) [ 1 11 ...
Uploads
Papers by Nasser Modiri