Confidentiality Assessment Model to Estimate Security during Effective E-Procurement Process
DOI:
https://doi.org/10.26438/ijcse/v6i1.361365Keywords:
Software E-Security, Confidentiality, Security FactorsAbstract
Building high secured software components is very important for component-based software projects. The confidentiality of software is one of the important factors determining the security of components. Estimating confidentiality near the beginning in the software development life cycle, particularly at design phase, may help the designers to integrate required highly secured for improving overall security of the developed software. In this paper researcher introduced a metric based model “Confidentiality Assessment Model (CAMOOD)”. This model measure the confidentiality induced by the use of various object-oriented design concepts like data hiding, aggregation, inheritance, coupling and cohesion. Herein, we compared our measurement results with various contributions.
References
[1] S. Chandra & R. A. Khan, “A Methodology to Check Confidentiality of a Class Hierarchy”, Elsevier, Vol. 10, Issue 3, 2010.
[2] Vineet Kumar Maurya, Santhosh Babu G, Jangam Ebenezer, Muni Sekhar V, Asoke K Talukder, Alwyn Roshan Pais, “Suraksha: A Security Designers’ Workbench”, presented in Hack.in 2009, IIT Kanpur, India, 17-19 March 2009.
[3] I. Chowdhury, B. Chan, and M. Zulkernine, "Security metrics for source code structures," in Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems Leipzig, Germany: ACM, 2008.
[4] A. Mishra, D. Agarwal and M. H. Khan, “Integrity Estimation Model: Fault Perspective”, International Journal on Recent and Innovation Trends in Computing and Communication, Vol 5, Issue 5, pp 1246-1249, May 2017.
[5] Bharat B. Madan, Katerina Goˇseva-Popstojanova, Kalyanaraman Vaidyanathan and Kishor S. Trivedi “Modeling and Quantification of Security Attributes of Software Systems”, Proceedings of the International Conference on Dependable Systems and Networks (DSN’02), IEEE, 2002, pp: 505-514.
[6] Danijel et. al., “Software Fault Prediction Metrics:A Systematic Literature Review”, ACM, 2013.
[7] Soham H. “Security Metric for Object Oriented Class Design- Result Analysis”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-6, May 2013.
[8] Dr. Linda Rogenberg, Dinnis Brennan, “Principle Components of Orthogonal Object Oriented Metrics (323-08-14)”, White Paper Analyzing Results of NASA Object oriented Data, Oct 2001.
[9] Raees Ahmad Khan, “Security Improvement of Object Oriented Design using Refactoring Rules”, I.J. Modern Education and Computer Science, 2015
[10] Finding Accessibility and Interaction vulnerability of Rational Rose Class Design Using Design Metrics Soham H. Gandhi, D. R. Anekar, Mahevash A. Shaikh, Ajinkya A. Salunkhe.
[11] Ubaidull et. al., “Security Requirement for Software Quality - A Survey of Engineering Discipline”, International Journal of ICT and Management, 2014.
[12] Shazia Yasin, Khalid Haseeb, "Cryptography Based E-Commerce Security: A Review". IJCSI-Vol. 9, Issue 2, No 1, March 2012.
[13] Shalini Chandra, “Availability state transition model”, ACM SIGSOFT Software Engineering Notes · May 2011
[14] Randy C. Marchany, Joseph G. Tront, "E-Commerce Security Issues"Proceedings of the 35th Hawaii International Conference on System Sciences – 2002.
[15] A. Mishra, D. Agarwal and M. H. Khan, “Confidentiality Estimation Model: Fault Perspective” International Journal of Advanced Research in Computer Science (IJARCS), Volume.8 Issue. 4, June 2017.
[16] Steve Counsell, Stephen Swift, Jason Crampton “The interpretation and Utility of Three Cohesion Metrics for Object – Oriented Design” (ACM Transactions on SE & Methodology, Vol. 15, No. 2, April 2006.
[17] P.Nikhat, S. Kumar and M. H. Khan, “Model to Quantify Integrity at Requirement Phase”, Indian Journal of Science and Technology, Vol. 9, Aug 2016.
[18] Amjan Shaik, “Statistical Analysis For Object Oriented Design Software Security Metrics”, International Journal of Engineering Science and Technology Vol. 2(5), 2010
[19] Suhel Ahmad Khan, “Confidentiality Quantification Model at Design Phase”, International Journal of Information and Education Technology, Vol. 2, No. 5, October 2012.
[20] M. Jureczko & L. Madeyski, “Towards identifying software project clusters with regard to defect prediction”, IEEE, 2010.
[21] Leslie Lamport, Password Authentication with Insecure Communication. Technical Note. Communication of the ACM, 1981.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
