2014
DOI: 10.3844/jcssp.2014.1298.1306
|View full text |Cite
|
Sign up to set email alerts
|

Dependability Attributes for Increased Security in Component-Based Software Development

Abstract: Existing software applications become increasingly distributed as their continuity and lifetimes are lengthened; consequently, the users' dependence on these applications is increased. The security of these applications has become a primary concern in their design, construction and evolution. Thus, these applications give rise to major concerns on the capability of the current development approach to develop secure systems. Component-Based Software Development (CBSD) is a software engineering approach. CBSD ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 52 publications
0
5
0
Order By: Relevance
“…These simulations could be improved. Babuska and Verbruggen (1996;Chandramohan and Kamalakkannan, 2014;Hussein and Nordin, 2014;Kareem, et al, 2014;Kahtan et al, 2014;Sridharan and Chitra, 2014) mentioned that modeling of complex systems will always remain an interactive approach. Thus, future study could consider the usage of other software packages or programming languages and incorporate graphic interface.…”
Section: Resultsmentioning
confidence: 99%
“…These simulations could be improved. Babuska and Verbruggen (1996;Chandramohan and Kamalakkannan, 2014;Hussein and Nordin, 2014;Kareem, et al, 2014;Kahtan et al, 2014;Sridharan and Chitra, 2014) mentioned that modeling of complex systems will always remain an interactive approach. Thus, future study could consider the usage of other software packages or programming languages and incorporate graphic interface.…”
Section: Resultsmentioning
confidence: 99%
“…To adopt evidence-based practical and theoretical perspectives, researchers, especially in the penetration testing domain, rely on solid empirical evidence that reports methodologies, frameworks, models, and practices. Systematic literature review (SLR) is one of the most suitable methods to encourage evidence-based security practices [93][94][95][96][97][98]. Researchers followed the SLR rules proposed by Kitchenham & Charters [56] and Keele & Bell [99].…”
Section: -3-research Methodologymentioning
confidence: 99%
“…Moreover, the massive volumes of data contain a lot of distortion, which makes data analysis difficult. Current methodologies lack the level of resilience necessary, necessitating the implementation of novel data analytics techniques and software tools [78,[95][96][97][98][99][100]. On the other hand, appropriate visual techniques must be developed in order to acquire meaningful insights into the data collected.…”
Section: B Rq5: Challenges and Future Directions Of Iot In E-mentioning
confidence: 99%