A Review of Approaches to Model Security into Software Systems

نویسندگان

  • Shafiq Hussain
  • Ghulam Rasool
  • Muhammad Atef
  • Abdul Karim Shahid
چکیده

Software security has a huge impact on almost all areas ranging from banking systems to critical systems. The rapid expansion of internet and distributed systems has forced developers, designers, engineers and manager to consider software security as an essential activity for their systems. Software security does not depend on the external measures such as firewalls but also on the internal security of software applications. Internal security of software systems is a major concern of current software systems. A number of methodologies have been developed over the time to address the issues of software security. In this paper, a survey of these methodologies has been presented. This paper surveys the methodologies only used for the internal security of software systems. The methodologies used for external security of software systems are not in the scope of this paper. This survey has focussed on four parameters of the methodologies: model driven methodologies, methodologies having automatic tool support, methodologies having no tool support and methodologies based on formal methods. A critical analysis of the methodologies is also presented. Future research directions are also discussed based on the critical analysis to develop a more secure methodology for software systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

A REVIEW ON SEQUENCING APPROACHES FOR MIXED-MODEL JUST-IN-TIME PRODUCTION SYSTEM

Research interests have been focused on the concept of penalizing jobs both for being early and for being tardy because not only of modern competitive industrial challenges of providing a variety of products at a very low cost by smoothing productions but also of its increasing and exciting computer applications. Here, sequencing approaches of the mixed- model just-in-time production systems is...

متن کامل

Innovation in the Agro-Food Sector: from Technical Innovation-Centred Approaches to Sustainability Transition Processes

Innovation is a complex phenomenon and process involving translation of knowledge into new techniques, products, services. It is considered crucial for sustainable agriculture development and achievement of long-term food security. The review describes the diversity of innovation and relates it to agro-food sector. It also sheds light on different innovation models and explores their contributi...

متن کامل

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013