2020
DOI: 10.1109/access.2020.2970784
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective

Abstract: Design of software can have a major impact on the overall security of the software. Developing a secure website design is a challenge for architectures. It depends on different and tough decisions which determine the security of website. Increasing number of vulnerabilities increase the level of security requirements. Hence, security design tactics are to be adopted to satisfy these security requirements. Security design tactics are the mechanisms to define, detect and mitigate vulnerabilities and attacks. The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
47
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 41 publications
(48 citation statements)
references
References 17 publications
0
47
0
1
Order By: Relevance
“…Further, different variables were defined as the basis for the assessment, and the systems were chosen based on a collection of metric results that use the Integrated AHP and TOPSIS methodology. Alenezi et al [35] developed the Fuzzy AHP-TOPSIS based hybrid approach for evaluating security architecture tactics and their attributes. They tested the efficacy of this method on a case study of real-time web application of Babasaheb Bhimrao Ambedkar University, Lucknow, India.…”
Section: Related Workmentioning
confidence: 99%
“…Further, different variables were defined as the basis for the assessment, and the systems were chosen based on a collection of metric results that use the Integrated AHP and TOPSIS methodology. Alenezi et al [35] developed the Fuzzy AHP-TOPSIS based hybrid approach for evaluating security architecture tactics and their attributes. They tested the efficacy of this method on a case study of real-time web application of Babasaheb Bhimrao Ambedkar University, Lucknow, India.…”
Section: Related Workmentioning
confidence: 99%
“…The coefficient correlation demonstrates the effect of the two-value association. The scale ranges from -1 to + 1 [52]. The value close to -1 indicates the lower connection among values, and the value close to + 1 indicates the higher connection among values.…”
Section: B Comparison Of the Resultsmentioning
confidence: 99%
“…The results of our study also show that the covered factors and their contribution to efficient security mechanisms in security tactics perspective are remarkable. Mamdouh Alenezi et al recently published an article in which they assessed the security of software in a tactics perspective [38]. This article contained Fuzzy AHP-TOPSIS only.…”
Section: Comparison Of the Resultsmentioning
confidence: 99%
“…This article contained Fuzzy AHP-TOPSIS only. Due to network structure rather than tree structure, ANP methodology is better than the AHP methodology [37,38]. Therefore, in the current paper, the authors have taken design tactics as a contributor in the first level of the network, which improvises the results in the end.…”
Section: Comparison Of the Resultsmentioning
confidence: 99%