3 research outputs found

    Case Study Analyses of Reliability of Software Application “ePasuria”

    Get PDF
    The focus of the research study is set on analyzes of the reliability of software application, aiming to determine the ways of measurement and determine the parameters of a reliable software application through the case study realized. Measurements of software reliability are important because it can be used to plan and control resources while implementing the software application and offer reliability regarding the correctness of the developed software. Throughout the study we elaborate the analyses of different problems that are encountered in order to maintain a higher level of reliable software application, especially the systems that are more complex and the process of their implementation depends on sensitive data. Furthermore we elaborate ways of detailed analysis and studies in achieving the reliability of software application and researches on the assessment of reliability of the software, and the measurement of the level of the failures in order to realize the level of reliability of a software application

    The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS

    No full text
    Reactive programming is a popular paradigm that has been used as a new solution in our proposed model for security in the cloud. In this context, we have been able to reduce the execution time compared to our previous work for the model proposed in cloud security, where the control of security depending on the ITSS (IT security specialist) of a certain organization based on selecting options. Some of the difficulties we encountered in our previous work while using traditional programming were the coordination of parallel processes and the modification of real-time data. This study provides results for two methods of programming based on the solutions of the proposed model for cloud security, with the first method of traditional programming and the use of reactive programming as the most suitable solution in our case. While taking the measurements in this paper, we used the same algorithms, and we present comparative results between the first and second methods of programming. The results in the paper are presented in tables and graphs, which show that reactive programming in the proposed model for cloud security offers better results compared to traditional programming
    corecore