Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process

被引:0
作者
Rajeev Kumar
Mohammad Zarour
Mamdouh Alenezi
Alka Agrawal
Raees Ahmad Khan
机构
[1] BBA University,Department of Information Technology
[2] Prince Sultan University,College of Computer & Information Sciences
来源
International Journal of Computational Intelligence Systems | 2019年 / 12卷
关键词
Software security; Software durability; Security durability; Fuzzy logic; Simple average method; Rating evaluation;
D O I
暂无
中图分类号
学科分类号
摘要
It is critical to develop secure software with long-term performance and capability to withstand and forestall the growing competition in the software development industry. To enhance the potential of Confidentiality, Integrity, and Availability (CIA), a mechanism is required to built in and secure the durability at the time of software development. Security of a software product is durable if the software works efficiently for user’s satisfaction up to the expected duration. Despite the fact that focusing on security which is durable enough considerably reduces maintenance cost, the work done on addressing security as well as durability issues simultaneously during software development remains minimal. To achieve durable security, there is a need to fill the gap between security and durability through identifying and establishing a relationship between security and durability attributes. This article extends the concept of the life span of security services and assesses as well as prioritizes security durability attributes by taking a real-time case study. While building durable security, security experts often face complicated decision problems. Hence, multi-criteria decision-making techniques have been used to solve the issues of measuring conflicting tangible/intangible criteria. In addition, the fuzzy simple average method is used for finding out the rating of security durability attributes. The work has been demonstrated by taking a case study. The results of the study would be useful for security developers to assure the importance of attributes for improving the duration of security.
引用
收藏
页码:627 / 642
页数:15
相关论文
共 70 条
[1]  
Kumar R(2016)Durability challenges in software engineering Crosstalk J. Defense Softw. Eng. 10 29-31
[2]  
Khan SA(2015)Revisiting software security: durability perspective Int. J. Hybrid. Inf. Technol. (SERSC). 8 311-322
[3]  
Khan RA(2010)Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness Inf. Secur. Policy Compliance. 34 523-548
[4]  
Kumar R(2018)The effect of software warranties on cyber-security ACM SIGSOFT Softw. Eng. Notes. 43 31-35
[5]  
Khan SA(1990)How to make a decision: the analytic hierarchy process Eur. J. Oper. Res. 48 9-26
[6]  
Khan RA(2017)A consensus model for hesitant fuzzy preference relations and its application in water allocation management Appl. Soft Comput. 58 265-284
[7]  
Bulgurcu B(2018)Missing values estimation and consensus building for incomplete hesitant fuzzy preference relations with multiplicative consistency Int. J. Comput. Intell. Syst, 11 101-119
[8]  
Cavusoglu H(2018)Consistency and consensus models with local adjustment strategy for hesitant fuzzy linguistic preference relations Int. J. Fuzzy Syst. 20 2216-2233
[9]  
Benbasat I(2002)A risk assessment methodology for incorporating uncertainties using fuzzy concepts Reliab. Eng. Syst. Safe. 78 173-183
[10]  
Linden D(2016)Deriving the priority weights from incomplete hesitant fuzzy preference relations in group decision making Knowl. Based Syst. Knowl. Based Syst. 99 71-78