A Quantitative Assessment Approach to COTS Component Security
نویسندگان
چکیده
منابع مشابه
A Component-oriented Approach to Security Risk Assessment
Security risk assessments are costly and time consuming and cannot be carried out from scratch each time a component is being reused in a new setting. This calls for a component-oriented approach tightly integrating security assessment in the system development and maintenance process. Such an approach requires a strategy for inferring useful information about the security of a composite compon...
متن کاملReliability Assessment of Elementary COTS Software Component
For predicting the reliability of a software application composed third party software components like COTS (Commercial-Off-The-shelf) one has to heavily rely on the reliability values available which may not be always correct. As, there can be several factors which can effect the reliability values for example, the vendors may be biased, it may not be possible to select test cases to execute a...
متن کاملA Common Criteria Based Approach for COTS Component Selection
Component-based software engineering (CBSE) endeavors to enable software developers to develop quality software systems with less time and resources than traditional development approaches. Software components must be identified and evaluated in order to determine if they provide required functionality for systems being developed. Consideration of security requirements for component selection i...
متن کاملA New Semi-Quantitative Approach to Open-Pit Mine Sustainability Assessment
Sustainability assessment has received numerous attentions in the mining industry. Mining sustainability includes the environmental, economic, and social dimensions, and a sustainable development is achieved when all these dimensions improve in a balanced manner. Therefore, to measure the sustainability score of a mine, we require an approach that evaluates all these three dimensions of mining ...
متن کاملA Six Sigma-Based Process to Improve COTS Component Filtering
specification of a component C, a set of components K relevant to C and called candidate solution SO, and a set of pre-selected components from SO, called solution SN. Sc(i) represents the map associated to the input value i defined in the domain of Sc. This map should provide a valid value on the output domain of Sc, i.e. there is no empty maps or invalid associations. A similar assumption is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematical Problems in Engineering
سال: 2013
ISSN: 1024-123X,1563-5147
DOI: 10.1155/2013/165029