Acceptance of any new approach by the organizations depends upon the users’ needs. Currently, reducing the cost and time invested in maintenance is a major challenge for the practitioners. Moreover, symmetrical and optimal maintenance is the need of the hour and it can be achieved by increasing the durability of software. Many attributes of the quality may affect the durability of the software and identification of durability attributes is a crucial task at the early stage of software development. Thus, it is a problem that contains multi-criteria within it. With the help of quantitative estimation, software durability may be assessed symmetrically and increased. In this row, the authors of this article have attempted to posit an effective technique to assess the durability of software. Based on empirical data through research, the presenters of this article suggest that fuzzy-based symmetrical method of Analytic Network Process (ANP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) would be an accurate methodology for assessing the durability of software. For determining the efficacy of this assessment, the researchers took six alternative software of a University. The results, as presented in this paper, would serve as guidelines for the practitioners who aim at achieving the preferred software durability.
Security is a peak significant quality element in the pitch of software engineering. Software security improvement is easily done with the support of factors, models and metrics of security. Software security should be analyzed with the help of its security factors. Security dimension is the main attribute in evaluation, executing, and calculating security in the way to organize and develop quality of software. It is to be identified that qualifications of security factors increased through inspecting damages, discriminating susceptibility and attacks in design development process. This review is discussing the description and categorization of accessible security properties. Durability is an attribute of security that refers to the capability of software to conclude of a creation on time. Software security is affected with security attributes as well as durability. A stable state of the secure software enhances additional security.This paper converse about software security at design level where software must be proficient to protect itself in a time period. Durability as a security factor makes a remarkable presence in software security as well as at the time while designing software.
Definitions and Literature BackgroundSoftware growth is impaired constantly from maintenance, interruptions, and unexploited methods [14]. This is not considering improvements in development skills, tools, and software mechanisms. Software security can be considered as an improvement to protect the software using its three attributes which are known as CIA [15][16][17][18][19]. Software security creates many techniques to protect software from illegal access and malicious occurrences. Security essentials are predictable methods that provide the uncracked methodologies [20]. Analysis of software security attributes is excited for unaffected information and satisfied customers.Security requirements estimate, how properties of system's software essential would be protected of some threats [21][22]. This is clear from the scholar's review that the set of attempt has been prepared in the pitch of security. The researchers recognized usual security attributes which are being used to defend software at unusual step of operation. It is assumed that time dependencies of security is an attribute of software [23][24][25]. Privacy is distinct as the assurance that information is not publicized to prohibited processes. Integrity is distinct as the situation that occurs when information of data is unaffected from its source [26][27][28][29].It has not been maliciously changed, transformed, or damaged. Integrity attentions on stopping unauthorized change of information. In difference to availability, confidentiality and integrity is the suitable, reliable access to information and data facilities for authorized consumers. These three attributes are the bases in the field of security [30][31][32][33]. With the enhancement of software security, a software can be protected from hazards, threats, etc. There happens an unboundedness of thinkable sour...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.