2020
DOI: 10.22266/ijies2020.1031.17
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Multi Criteria Decision Analysis Method for Assessing Security Design Tactics for Web Applications

Abstract: Security and design tactics estimation of web application for ensuring the security, efficiency and design tactics of web applications is necessary. A survey conducted by the security research team, Micro Focus, of the USA reveals that 80% of the vulnerability defects occur due to the coding defect, validation causes 60% of the errors, 70% errors are due to encapsulation and path traversal. Such statistics call for a more efficacious design to enhance software security. The primary research goal of this study … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…Author Year Applied on Techniques compared Similarity measure performed [6] 2019 Supplier selection Fuzzy analytic hierarchy process (FAHP), FT, and FV No [9] 2021 House selection problem FT, FV, FWASPAS, and fuzzy measure (FM) Yes [8] 2022 Dentistry biomaterial selection AHP, followed by the use of AHP-VIKOR, AHP-TOPSIS, AHP-MOORA, AHP-ELECTRE, and AHP-PROMTHEE Yes [11] 2022 Supplier selection TOPSIS, VIKOR, COMET, SPOTIS, and MARCOS Yes [7] 2023 Private tutor selection AHP-SAW, AHP-WP, and AHP-TOPSIS No [10] 2019 Web service selection SAW, AHP, TOPSIS VIKOR, and COPRAS Yes [12] 2023 Cloud service provider selection Hesitant intuitionistic FD-TOPSIS model No [13] 2021 Cloud environment AHP, PROMETHEE, TOPSIS, and VIKOR No [14] 2022 Clean energy evaluation SAW, TOPSIS, ELECTRE, VIKOR and COPRAS No [15] 2020 Web applications security design assessment…”
Section: Fuzzy Decision-making Trial and Evaluation Laboratorymentioning
confidence: 99%
See 2 more Smart Citations
“…Author Year Applied on Techniques compared Similarity measure performed [6] 2019 Supplier selection Fuzzy analytic hierarchy process (FAHP), FT, and FV No [9] 2021 House selection problem FT, FV, FWASPAS, and fuzzy measure (FM) Yes [8] 2022 Dentistry biomaterial selection AHP, followed by the use of AHP-VIKOR, AHP-TOPSIS, AHP-MOORA, AHP-ELECTRE, and AHP-PROMTHEE Yes [11] 2022 Supplier selection TOPSIS, VIKOR, COMET, SPOTIS, and MARCOS Yes [7] 2023 Private tutor selection AHP-SAW, AHP-WP, and AHP-TOPSIS No [10] 2019 Web service selection SAW, AHP, TOPSIS VIKOR, and COPRAS Yes [12] 2023 Cloud service provider selection Hesitant intuitionistic FD-TOPSIS model No [13] 2021 Cloud environment AHP, PROMETHEE, TOPSIS, and VIKOR No [14] 2022 Clean energy evaluation SAW, TOPSIS, ELECTRE, VIKOR and COPRAS No [15] 2020 Web applications security design assessment…”
Section: Fuzzy Decision-making Trial and Evaluation Laboratorymentioning
confidence: 99%
“…-Step 4: crisp values obtained via defuzzification. CFCS technique was proposed by Opricovic and Tzeng for getting total-influence matrix figures with the steps in (9)(10)(11)(12)(13)(14)(15).…”
Section: Fuzzy Decision-making Trial and Evaluation Laboratorymentioning
confidence: 99%
See 1 more Smart Citation
“…Auditability [P4]: Appropriateness is a key safety component. For example, audit logs primarily record who accessed which electronic health record (EHR) (or particular personal health record), why they did so, and the timestamp of each life cycle operation [23].…”
Section: Factors and Alternative Of Hssmentioning
confidence: 99%
“…The basic difference between the classical computer and quantum computer are its operation on bit and qubits. Bits operates with 1 and 0 operation at two different time lines, while in quantum computer the qubits operate 1 and 0 at the same time by the use of superposition principle and entanglement [15]. Fig.…”
Section: Quantum Enabled Cryptographymentioning
confidence: 99%