On Estimating the Security Risks of Composite Software Services

نویسندگان

  • Jian Yin
  • Chunqiang Tang
  • Xiaolan Zhang
  • Michael McIntosh
چکیده

With the rapid adoption of the Service Oriented Architecture (SOA), sophisticated software systems are increasingly built by composing coarse-grained service components offered by different organizations through standard web service interfaces. The ability to quantify end-to-end security risks of composite software services is extremely valuable to businesses that increasingly rely on web applications to interact with their customers and partners. In this position paper, we propose a framework that predicts the probability of end-to-end security breaches of a software service by using a combination of three models: (1) a software security model that describes the probability distribution of security bugs in individual components, (2) a service composition model that describes the interactions of components and the contribution of security bugs in individual components to the overall security of the service, and (3) a hacking exposure model that estimates hackers’ knowledge of individual components and hence the probability that a security hole, if exists, may be exploited.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

Estimating Software Cost with Security Risk Potential

Software houses are now keen to provide secure software as requested by customers’ desire with respect to security and quality of their products especially related to the software costing estimation in the software development and implementation environment. Therefore, there is a need to identify the potential security risks while estimating the application cost. In this paper, we provide a lis...

متن کامل

Estimating the Future of Electronic Health Information System in Society

Background: The health information system provides an integrated platform and an information connection between the actors of the health system regardless of temporal and spatial limitations. Objective This study aims to investigate the factors affecting the development of electronic health record (EHR) system and predict the future of this system in Iran. Methods: In this descriptive study, ...

متن کامل

A Study on Factors Affecting Operational Electronic Banking Risks in Iran Banking Industry (Case Study: Kermanshah Melli Bank)

Nowadays, advances in information and communication technologies, has provided an opportunity for banks to provide their electronic services to their customers in remote areas. This technological innovation by E–banking systems has brought about many benefits to customers while it has been accompanied by a number of risks including the operational ones. This risks need to be identified and mana...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006