Total views : 303

Model to Quantify Integrity at Requirement Phase

Affiliations

  • Department of Computer Application, Integral University, Kursi Road, Dashauli, Lucknow - 226021, Uttar Pradesh, India
  • Department of Computer Engineering, I.E.T, Sitapur Road, Lucknow - 226021, Uttar Pradesh, India

Abstract


Objectives: The software security and its proper measurement involve various tools and techniques. To make software secure its foundation stone, the requirement, should also be secure and therefore the integrity control for requirement at the same phase became the objective for delivering secure requirement and so forth the software. Method/Analysis: The past research study entails about less secure software deliver by industries and among the major cause of security lacking, one cause is integrity to requirements. Requirement integrity can be observed as trustworthy, complete and veracity requirement for producing secure software. Only conceptual notion of integrity is not capable to make any component secure but it must be depicted in understandable and quantifiable idiom for assessing the better security solution to requirement and therefore to software. Findings: MQIR (Model to quantify integrity) for requirement at requirement phase of software development process is a new assessment technique that tries to satisfy all major constraints regarding secure requirements and so forth for software. To implement this new technique a relevant set of values in terms of input is captured for proper data management from various live projects under going in some software companies of repute. An appropriate quantification of requirement data is also furnished for sufficient checking of security level and its efficiency. The technique has also been validated through capturing online shopping data so that its implications may also be assessed accurately. Novelty/Improvement: As far as the application of this technique (MQIR) is concern, the article emphasis on complete usability of online functioning at its highest level of integrity that maintains security with the boundary conditions of e-commerce.

Keywords

Integrity, Requirement Traits, Security Attributes, Security Estimation and Integrity Model.

Full Text:

 |  (PDF views: 319)

References


  • Pfleeger, Shari Lawrence, and Robert K. Cunningham. Why Measuring Security Is Hard. Co-published By The IEEE Computer And Reliability Societies. 2010; p. 46-54.
  • CERT. Date accessed: 02 May 2015: Available from: http://www.cert.org.
  • Flechais, Sasse M and Hailes SMV. Bringing Security Home: A Process for developing secure and usable systems, NSPW’03. ACM. 2003 August; p. 18-21.
  • Madan BB, Popstojanova KG, Vaidyanathan K and Trivedi KS. A Method for Modeling and Quantifying the Security Attributes of Intrusion Tolerant System. Elsevier: An International Journal of Performance Evaluation. 2004; 56:167-86.
  • Nikhat Parveen, Md Rizwan Beg, et al. Software Security Issues: Requirement Perspectives. International Journal of Scientific & Engineering Research. 2014 July; 5(7):11-15. ISSN 2229-5518.
  • Li Peng, Yun Mao, et al. Information Integrity Policies. Date accessed: 5 Mar 2015: Available from: www.cis.upenn.edu/~stevez/papers/LMZ03.pdf.
  • Chandra S and Khan RA. Software Security Metric Identification Framework (SSM). International Conference on Advances in Computing, Communication and Control, ICAC3’09. ACM. 2009.
  • Se-Yun Kim, Seong Taek Park, Mi Hyun Ko. Analysis of the Competencies of Information Security Consultants: Comparison between Required Level and Retention Level. Indian Journal of Science and Technology. 2015 Sep; 8(21). DOI: 10.17485/ijst/2015/v8i21/79119.
  • Walton GH, Longstaff TA, Linder RC. Computational Evaluation of Software Security Attributes. IEEE. 1997.
  • Available from: http://www.sqa.net/softwarequalitymetrics.html.
  • Parveen Nikhat, Md Rizwan Beg and Khan MH. Bridging the Gap between Requirement and Security through Secure Requirement Specification Checklist. Pune, India: Proceedings of 16th IRF International Conference, 14th December 2014. p. 6-10. ISBN: 978-93-84209-74-2.
  • Shahid Iqbal and Naeem Ahmed Khan M. Yet another Set of Requirement Metrics for Software Projects. International Journal of Software Engineering and Its Applications. 2012; 6.1:19-28.
  • Bokhari Mohammad Ubaidullah and Shams Tabrez Ubaidullah Siddiqui. Metrics for Requirements Engineering and Automated Requirements Tools. Proceedings of the 5th National Conference, INDIACom-2011.
  • Ali Mohammed Javeed. Metrics for Requirements Engineering. 2006. Available from: www.cs.umu.se/education/examina/Rapporter/JaveedAli.pdf.
  • Chandra S and Khan RA. Software Security Metric Identification Framework (SSM). International Conference on Advances in Computing, Communication and Control, ICAC3’09. ACM. 2009.
  • Wang C and Wulf. A Framework for Security Measurement. Proc. National Information Systems Security Conference. 1997 Oct 7-10; p. 522-33.
  • Subramaniam Hema, Zulzalil Hazura, Marzanah A Jabar, Saadah Hassan. Feasibility Study of Aspect Mining at Requirement Level. Indian Journal of Science and Technology. 2014 Jan; 7(5). DOI: 10.17485/ijst/2014/v7i5/49471.
  • Chandra S, Khan RA. A Methodology to Check Integrity of a Class Hierarchy. International Journal of Recent Trends in Engineering. 2009 November; 2(4):83-85.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.