A Review of Approaches to Model Security into Software Systems
نویسندگان
چکیده
Software security has a huge impact on almost all areas ranging from banking systems to critical systems. The rapid expansion of internet and distributed systems has forced developers, designers, engineers and manager to consider software security as an essential activity for their systems. Software security does not depend on the external measures such as firewalls but also on the internal security of software applications. Internal security of software systems is a major concern of current software systems. A number of methodologies have been developed over the time to address the issues of software security. In this paper, a survey of these methodologies has been presented. This paper surveys the methodologies only used for the internal security of software systems. The methodologies used for external security of software systems are not in the scope of this paper. This survey has focussed on four parameters of the methodologies: model driven methodologies, methodologies having automatic tool support, methodologies having no tool support and methodologies based on formal methods. A critical analysis of the methodologies is also presented. Future research directions are also discussed based on the critical analysis to develop a more secure methodology for software systems.
منابع مشابه
Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملA REVIEW ON SEQUENCING APPROACHES FOR MIXED-MODEL JUST-IN-TIME PRODUCTION SYSTEM
Research interests have been focused on the concept of penalizing jobs both for being early and for being tardy because not only of modern competitive industrial challenges of providing a variety of products at a very low cost by smoothing productions but also of its increasing and exciting computer applications. Here, sequencing approaches of the mixed- model just-in-time production systems is...
متن کاملInnovation in the Agro-Food Sector: from Technical Innovation-Centred Approaches to Sustainability Transition Processes
Innovation is a complex phenomenon and process involving translation of knowledge into new techniques, products, services. It is considered crucial for sustainable agriculture development and achievement of long-term food security. The review describes the diversity of innovation and relates it to agro-food sector. It also sheds light on different innovation models and explores their contributi...
متن کاملA Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کامل