2012
DOI: 10.5815/ijcnis.2012.11.03
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework

Abstract: -Evaluating the security of software systems is a complex problem for the research communities due to the multifaceted and complex operational environment of the system involved. Many efforts towards the secure system development methodologies like secSDLC by Microsoft have been made but the measurement scale on which the security can be measured got least success. As with a shift in the nature of software development from standalone applications to distributed environment where there are a number of potential… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…Nonetheless, the task of embedding dependability attributes into the software component development process is less challenging than the task of evaluating the dependability of these attributes [20] because the requirements of dependability attributes must be specified during the early stages of software component development, along with the complex nature of the operational environment itself. A well-established scale that can measure the dependability of a software component remains difficult to establish in the research community [21].…”
Section: Introductionmentioning
confidence: 99%
“…Nonetheless, the task of embedding dependability attributes into the software component development process is less challenging than the task of evaluating the dependability of these attributes [20] because the requirements of dependability attributes must be specified during the early stages of software component development, along with the complex nature of the operational environment itself. A well-established scale that can measure the dependability of a software component remains difficult to establish in the research community [21].…”
Section: Introductionmentioning
confidence: 99%
“…Generally Third party verifiers [3] [12] are used to manage these services between cloud and client system. Though there are various third parties are available as an individual in managing the transmission of the data, there is a need for an integrated security [1] model to provide secured transaction between cloud and client system. Among those verifiers, the third party accounting system is used to examine and verify the data sharing in the storage to ensure that the unauthorized person do not access the information.…”
Section: Introductionmentioning
confidence: 99%
“…Many studies have stated that the only means to solve software vulnerability is to consider software security development (Khaled and Han, 2006;Kim, 2004;McGraw, 2004;Mir and Quadri, 2012;Simpson, 2012). However, efforts to measure and improve software security remain under investigation (Alberts et al, 2012;Colombo et al, 2012;Karen et al, 2006;Lai, 2012;Steward et al, 2012).…”
Section: Software Securitymentioning
confidence: 99%