A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Knowledge-oriented Approach to Security Requirements for an E-Voting System
2012
International Journal of Computer Applications
In this paper, we introduce a knowledge-oriented approach for the Security Requirements Engineering phase for developing E-Voting System. ...
The knowledge acquired through the process of eliciting and analyzing secure E-Voting System is represented in the form of UML models; which can be made available to future developers and the dependency ...
The Object-Oriented approach models are compiled in the Unified Modeling Language (UML). UML is used for modeling and specification of the requirements for software development. ...
doi:10.5120/7671-0953
fatcat:hszj3jtfrfhzvgvuclvtz5ahba
A BRIEF REVIEW OF SECURITY METRICS FOR OBJECT-ORIENTED CLASS DESIGNS
2016
INTERNATIONAL JOURNAL ONLINE OF SCIENCE
security metrics to liveknowledge Encapsulation (accessibility) and Cohesion (interactions) of a given object-oriented category from the purpose of read of potential info flow and conjointly discuss concerning ...
Be that as it may, these concentrates on have not considered security as much as other quality properties. Additionally, most security studies center at the level of individual system explanations. ...
Taking security early phase of a system development should have an impact on reducing many software vulnerabilities. ...
doi:10.24113/ijoscience.v2i2.79
fatcat:pgaz34rx3jcbxm5j2z44oenaj4
Goal Oriented Requirements Engineering for Non-functional Factors
2012
International Journal of Computer Applications
This paper discusses about the application of Goal-Oriented Requirements engineering for eliciting the scalability, analyzing the Reliability requirements and eliciting and analyzing the security Requirements ...
Requirements phase is the most important stage in the Software Development Process. ...
GORE APPROACH FOR SECURITY Security is an integral part of the Software Development Life Cycle. ...
doi:10.5120/8214-1634
fatcat:k5dxflrthrcphjjjyhxiqdrvua
Security Concerns of Object Oriented Software Architectures
2012
International Journal of Computer Applications
An attempt is made in this paper to analyze the issues of architecture security of objectoriented software's using common security concepts to evaluate the security of a system under design. ...
Testing and measuring the security of software system architectures is a difficult task. ...
Moreover, the paradigm shift from the waterfall model of software development to the iterative and incremental style of software development has resulted in object-oriented software testing being iterative ...
doi:10.5120/5012-7334
fatcat:2apv3x353zaylgl4dwptkni2bq
Evolving Security Requirements in Multi-layered Service-Oriented-Architectures
[chapter]
2012
Lecture Notes in Computer Science
In such a context, it is not sufficient to apply the corresponding adaptations only at the service orchestration or at the choreography level; there is also the need for controlling the impact of new security ...
In this paper we survey several research questions related to security cross-domain and cross-layer security functionality in Service Oriented Architectures, from an original point of view. ...
Acknowledgment This work was supported by the ANR, the French National Research Organization through the project CESSA (Compositional Evolution of Secure Services with Aspects, ID.: 09-SEGI-002-01). ...
doi:10.1007/978-3-642-28879-1_13
fatcat:5hfvw5kbm5hnrdycqt5vmp32ja
Preface
1997
IBM Systems Journal
Srinivasan and Chang address the basic question of object persistence and its impact on the storage of data by object-oriented and non-object-oriented ap- plications, which is another example of the challenge ...
Preface
Software application development is moving closer to a long-held goal: engineering new systems by manipulating existing software parts and templates, writing new software only when necessary to ...
doi:10.1147/sj.361.0002
fatcat:p3rxyid6ingwbhoegsrqat6a4i
Suggest an Aspect-Oriented Design Approach for UML Communication Diagram
[article]
2013
arXiv
pre-print
Our approach proposed to use aspect-oriented software development (AOSD) mechanisms to solve the issues for interactions of the communication diagram in UML that support only the Object-Oriented mechanisms ...
More and more works are done on the design of the Unified Modeling Language (UML) which is designed to help us for modeling effective object oriented software, Existing Object-Oriented design methods are ...
INTRODUCTION Aspect-Oriented Software Development (ASOD) has arisen as an approach that supports a better Separation of Concerns (SoC) and more adequately reflects the way developers think about the system ...
arXiv:1307.1088v1
fatcat:3ayhpmockncrzp45pdjn4xvcda
Security Process Capability Model Based on ISO/IEC 15504 Conformant Enterprise SPICE
2014
Applied Computer Systems
In the context of modern information systems, security has become one of the most critical quality attributes. The purpose of this paper is to address the problem of quality of information security. ...
An approach to solve this problem is based on the main assumption that security is a process oriented activity. ...
Software engineering being an extremely creative activity has been able to express it in process oriented terms. ...
doi:10.2478/acss-2014-0006
fatcat:kr5mly36lzdwdbmo4rpe2gm4am
Experimental Analysis of SPF Based Secure Web Application
2015
International Journal of Modern Education and Computer Science
For implementation of this Security Performance framework based trusted operating system, we propose object oriented based Code generation through forward engineering. ...
The novel integration of security engineering with model-driven software expansion approach has varied advantages. ...
This is based on object-oriented and SPF based conceptual modeling techniques applied to the development of online web applications. ...
doi:10.5815/ijmecs.2015.02.07
fatcat:2xlgithcxfhyljvdlh3okaasc4
Authorization Estimation Model: An Object Oriented Design Complexity Perspective
2014
International Journal of Security and Its Applications
The assessment of security using the model is more appropriate and its validation signifies the valid impact of structural and functional information of object oriented design software. ...
Software security is one of the most considerable domains of software development. It provides a strong mechanism to manage and incorporate security features for precious estimation at design phase. ...
Model-driven approach has recently received much attention in developing secure software and systems at an early stage of the software development life cycle. ...
doi:10.14257/ijsia.2014.8.5.20
fatcat:xeyqdijd2rfrtajp63lzf5yt5y
COMPARATIVE LITERATURE ANALYSIS ON SECURITY REQUIREMENTS ENGINEERING
2020
Zenodo
Security Requirements Engineering is one of the most important parts of the software development lifecycle that assist the software developer in developing a quality cost effective software application ...
This paper presents a comparative literature analysis of several existing security requirements engineering approaches for the development of secure software application. ...
The security requirement engineer tries to elicit all the relevant security requirements in the early phase of software development lifecycle so that he can assist the developer in developing the secure ...
doi:10.5281/zenodo.3596327
fatcat:lqghlajcine4xe23xn2ma3xbha
Developing Secure Systems: A Comparative Study of Existing Methodologies
2016
Lecture Notes on Software Engineering
With the increasing demand for developing high-quality and more reliable systems, the process of developing trustworthy computer software is a challenging one. ...
At the end of this paper, we provide a discussion of these three approaches and how they can be used to provide guidance for future secure software development processes. ...
They aim to provide guidance for software engineers to increase the assurance of software quality and therefore increase the software's security [8] , [9] . ...
doi:10.7763/lnse.2016.v4.239
fatcat:3leyw5pr5ne2zgwu5ncoi6ehy4
Impact Analysis of Cohesion and Abstraction on Availability Issue at Early Stagerly Stage
2018
International Journal for Research in Applied Science and Engineering Technology
Availability issue of software quality is one of the well-known topics of research in software engineering. Assessment used to improve the quality of software systems. ...
The effect of our try out indicates that extensive apply of inheritance leads to models that are more difficult to modify. ...
Object-oriented is a grouping approach that is skilled to arrange the issue in terms of object and it might give numerous paybacks on abstraction and cohesion of software issue into effectively comprehended ...
doi:10.22214/ijraset.2018.4796
fatcat:pd4fvhbtczfa3nex35igspivq4
A Taxonomy Of Aspect-Oriented Security
2011
Review of Business Information Systems (RBIS)
This paper attempts to categorize research outputs conducted in this area, and evaluate the usability of the aspect-oriented paradigm in terms of software security. ...
Aspect-Oriented Programming is gaining prominence, particularly in the area of security. ...
The contributions here are related to the engineering of secure and trustworthy software systems. ...
doi:10.19030/rbis.v12i1.4400
fatcat:w6f34fzqirb6fg2ov64l7q7mw4
Confidentiality Quantification Model at Design Phase
2012
International Journal of Information and Education Technology
The assessment of security using the model is more appropriate and its validation signifies the valid impact of structural and functional information of object oriented design software. ...
Software security is one of the most significant factors of software development. ...
Using the concept of software security estimation during development of software, security can be measured by analyzing object oriented design constructs, measurement of security attributes like confidentiality ...
doi:10.7763/ijiet.2012.v2.199
fatcat:wtfxzcwh2fhi5pxy4qk34zvuje
« Previous
Showing results 1 — 15 out of 82,193 results