Filters








82,193 Hits in 7.4 sec

A Knowledge-oriented Approach to Security Requirements for an E-Voting System

P. Salini, S. Kanmani
2012 International Journal of Computer Applications  
In this paper, we introduce a knowledge-oriented approach for the Security Requirements Engineering phase for developing E-Voting System.  ...  The knowledge acquired through the process of eliciting and analyzing secure E-Voting System is represented in the form of UML models; which can be made available to future developers and the dependency  ...  The Object-Oriented approach models are compiled in the Unified Modeling Language (UML). UML is used for modeling and specification of the requirements for software development.  ... 
doi:10.5120/7671-0953 fatcat:hszj3jtfrfhzvgvuclvtz5ahba

A BRIEF REVIEW OF SECURITY METRICS FOR OBJECT-ORIENTED CLASS DESIGNS

Mona Vishwakarma, Vaibhav Udgir
2016 INTERNATIONAL JOURNAL ONLINE OF SCIENCE  
security metrics to liveknowledge Encapsulation (accessibility) and Cohesion (interactions) of a given object-oriented category from the purpose of read of potential info flow and conjointly discuss concerning  ...  Be that as it may, these concentrates on have not considered security as much as other quality properties. Additionally, most security studies center at the level of individual system explanations.  ...  Taking security early phase of a system development should have an impact on reducing many software vulnerabilities.  ... 
doi:10.24113/ijoscience.v2i2.79 fatcat:pgaz34rx3jcbxm5j2z44oenaj4

Goal Oriented Requirements Engineering for Non-functional Factors

D. FrancisXavierChristopher, E. Chandra
2012 International Journal of Computer Applications  
This paper discusses about the application of Goal-Oriented Requirements engineering for eliciting the scalability, analyzing the Reliability requirements and eliciting and analyzing the security Requirements  ...  Requirements phase is the most important stage in the Software Development Process.  ...  GORE APPROACH FOR SECURITY Security is an integral part of the Software Development Life Cycle.  ... 
doi:10.5120/8214-1634 fatcat:k5dxflrthrcphjjjyhxiqdrvua

Security Concerns of Object Oriented Software Architectures

Dinesh KumarSaini
2012 International Journal of Computer Applications  
An attempt is made in this paper to analyze the issues of architecture security of objectoriented software's using common security concepts to evaluate the security of a system under design.  ...  Testing and measuring the security of software system architectures is a difficult task.  ...  Moreover, the paradigm shift from the waterfall model of software development to the iterative and incremental style of software development has resulted in object-oriented software testing being iterative  ... 
doi:10.5120/5012-7334 fatcat:2apv3x353zaylgl4dwptkni2bq

Evolving Security Requirements in Multi-layered Service-Oriented-Architectures [chapter]

Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira, Herve Grall, Mario Südholt
2012 Lecture Notes in Computer Science  
In such a context, it is not sufficient to apply the corresponding adaptations only at the service orchestration or at the choreography level; there is also the need for controlling the impact of new security  ...  In this paper we survey several research questions related to security cross-domain and cross-layer security functionality in Service Oriented Architectures, from an original point of view.  ...  Acknowledgment This work was supported by the ANR, the French National Research Organization through the project CESSA (Compositional Evolution of Secure Services with Aspects, ID.: 09-SEGI-002-01).  ... 
doi:10.1007/978-3-642-28879-1_13 fatcat:5hfvw5kbm5hnrdycqt5vmp32ja

Preface

Gene F. Hoffnagle
1997 IBM Systems Journal  
Srinivasan and Chang address the basic question of object persistence and its impact on the storage of data by object-oriented and non-object-oriented ap- plications, which is another example of the challenge  ...  Preface Software application development is moving closer to a long-held goal: engineering new systems by manipulating existing software parts and templates, writing new software only when necessary to  ... 
doi:10.1147/sj.361.0002 fatcat:p3rxyid6ingwbhoegsrqat6a4i

Suggest an Aspect-Oriented Design Approach for UML Communication Diagram [article]

Mohammed F. Nather, Dr. Nada N. Saleem
2013 arXiv   pre-print
Our approach proposed to use aspect-oriented software development (AOSD) mechanisms to solve the issues for interactions of the communication diagram in UML that support only the Object-Oriented mechanisms  ...  More and more works are done on the design of the Unified Modeling Language (UML) which is designed to help us for modeling effective object oriented software, Existing Object-Oriented design methods are  ...  INTRODUCTION Aspect-Oriented Software Development (ASOD) has arisen as an approach that supports a better Separation of Concerns (SoC) and more adequately reflects the way developers think about the system  ... 
arXiv:1307.1088v1 fatcat:3ayhpmockncrzp45pdjn4xvcda

Security Process Capability Model Based on ISO/IEC 15504 Conformant Enterprise SPICE

Antanas Mitasiunas, Leonids Novickis, Rimas Kalpokas
2014 Applied Computer Systems  
In the context of modern information systems, security has become one of the most critical quality attributes. The purpose of this paper is to address the problem of quality of information security.  ...  An approach to solve this problem is based on the main assumption that security is a process oriented activity.  ...  Software engineering being an extremely creative activity has been able to express it in process oriented terms.  ... 
doi:10.2478/acss-2014-0006 fatcat:kr5mly36lzdwdbmo4rpe2gm4am

Experimental Analysis of SPF Based Secure Web Application

Nitish Pathak, Girish Sharma, B. M. Singh
2015 International Journal of Modern Education and Computer Science  
For implementation of this Security Performance framework based trusted operating system, we propose object oriented based Code generation through forward engineering.  ...  The novel integration of security engineering with model-driven software expansion approach has varied advantages.  ...  This is based on object-oriented and SPF based conceptual modeling techniques applied to the development of online web applications.  ... 
doi:10.5815/ijmecs.2015.02.07 fatcat:2xlgithcxfhyljvdlh3okaasc4

Authorization Estimation Model: An Object Oriented Design Complexity Perspective

Suhel Ahmad Khan, Raees Ahmad Khan
2014 International Journal of Security and Its Applications  
The assessment of security using the model is more appropriate and its validation signifies the valid impact of structural and functional information of object oriented design software.  ...  Software security is one of the most considerable domains of software development. It provides a strong mechanism to manage and incorporate security features for precious estimation at design phase.  ...  Model-driven approach has recently received much attention in developing secure software and systems at an early stage of the software development life cycle.  ... 
doi:10.14257/ijsia.2014.8.5.20 fatcat:xeyqdijd2rfrtajp63lzf5yt5y

COMPARATIVE LITERATURE ANALYSIS ON SECURITY REQUIREMENTS ENGINEERING

Md Tarique Jamal Ansari*1, Dhirendra Pandey2 & Naseem Ahmad Khan3
2020 Zenodo  
Security Requirements Engineering is one of the most important parts of the software development lifecycle that assist the software developer in developing a quality cost effective software application  ...  This paper presents a comparative literature analysis of several existing security requirements engineering approaches for the development of secure software application.  ...  The security requirement engineer tries to elicit all the relevant security requirements in the early phase of software development lifecycle so that he can assist the developer in developing the secure  ... 
doi:10.5281/zenodo.3596327 fatcat:lqghlajcine4xe23xn2ma3xbha

Developing Secure Systems: A Comparative Study of Existing Methodologies

Bandar M. Alshammari, Colin J. Fidge, Diane Corney
2016 Lecture Notes on Software Engineering  
With the increasing demand for developing high-quality and more reliable systems, the process of developing trustworthy computer software is a challenging one.  ...  At the end of this paper, we provide a discussion of these three approaches and how they can be used to provide guidance for future secure software development processes.  ...  They aim to provide guidance for software engineers to increase the assurance of software quality and therefore increase the software's security [8] , [9] .  ... 
doi:10.7763/lnse.2016.v4.239 fatcat:3leyw5pr5ne2zgwu5ncoi6ehy4

Impact Analysis of Cohesion and Abstraction on Availability Issue at Early Stagerly Stage

Dr. Brijesh Kumar Bhardwaj
2018 International Journal for Research in Applied Science and Engineering Technology  
Availability issue of software quality is one of the well-known topics of research in software engineering. Assessment used to improve the quality of software systems.  ...  The effect of our try out indicates that extensive apply of inheritance leads to models that are more difficult to modify.  ...  Object-oriented is a grouping approach that is skilled to arrange the issue in terms of object and it might give numerous paybacks on abstraction and cohesion of software issue into effectively comprehended  ... 
doi:10.22214/ijraset.2018.4796 fatcat:pd4fvhbtczfa3nex35igspivq4

A Taxonomy Of Aspect-Oriented Security

Keshnee Padayachee, Ntobeko Wakaba
2011 Review of Business Information Systems (RBIS)  
This paper attempts to categorize research outputs conducted in this area, and evaluate the usability of the aspect-oriented paradigm in terms of software security.  ...  Aspect-Oriented Programming is gaining prominence, particularly in the area of security.  ...  The contributions here are related to the engineering of secure and trustworthy software systems.  ... 
doi:10.19030/rbis.v12i1.4400 fatcat:w6f34fzqirb6fg2ov64l7q7mw4

Confidentiality Quantification Model at Design Phase

Suhel Ahmad Khan, Raees Ahmad Khan
2012 International Journal of Information and Education Technology  
The assessment of security using the model is more appropriate and its validation signifies the valid impact of structural and functional information of object oriented design software.  ...  Software security is one of the most significant factors of software development.  ...  Using the concept of software security estimation during development of software, security can be measured by analyzing object oriented design constructs, measurement of security attributes like confidentiality  ... 
doi:10.7763/ijiet.2012.v2.199 fatcat:wtfxzcwh2fhi5pxy4qk34zvuje
« Previous Showing results 1 — 15 out of 82,193 results