A Generic Model for Assessing Multilevel Security-Critical Object-Oriented Programs
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 11
Abstract
The most promising approach for developing secure systems is the one which allows software developers to assess and compare the relative security of their programs based on their designs. Thereby, software metrics provide an easy approach for evaluating the security of certain object-oriented designs. They can also measure the impact on security that caused by modifications to existing programs. However, most studies in this area focus on a binary classification of data, either is classified or unclassified. In fact, there are other models with other classifications of data, for instance, the common model used by Defense departments that classifies data into four security levels. However, these various classifications have received little attention in terms of measuring their effect. This paper introduces a model for measuring information flow of security-critical data within a certain object-oriented program with multilevel classification of its security-critical data. It defines a set of object-oriented security metrics which are capable of assessing the security of a given program’s design from the point of view of potential information flow. These metrics can be used to compare the security of programs or assess the effect of program modifications on security. Specifically, this paper proposes a generic model that consists of several security metrics to measure the relative security of object-oriented designs with respect to design quality properties of accessibility, cohesion, coupling, and design size.
Authors and Affiliations
Bandar M. Alshammari
Security Issues in Software Defined Networking (SDN): Risks, Challenges and Potential Solutions
SDN (Software Defined Networking) is an architecture that aims to improve the control of network and flexibility. It is mainly connected with open flow protocol and ODIN V2 for wireless communication. Its architecture is...
Different Protocols for High Speed Networks
New challenges arise with the presence of various types of physical links, such as wireless networks, high speed and satellite in today’s ever-changing network. It is clear that the TCP throughput deteriorates in h...
The Impact of Motivator and Demotivator Factors on Agile Software Development
Since the last decade, Agile software development has emerged as a widely utilized software development method keeping in view the developing countries of South Asia. The literature reports significant challenges and bar...
An Unsupervised Local Outlier Detection Method for Wireless Sensor Networks
Recently, wireless sensor networks (WSNs) have provided many applications, which need precise sensing data analysis, in many areas. However, sensing datasets contain outliers sometimes. Although outliers rarely occur, th...
A Comparison Study between Data Mining Tools over some Classification Methods
Nowadays, huge amount of data and information are available for everyone, Data can now be stored in many different kinds of databases and information repositories, besides being available on the Internet or in printed f...