Open Access   Article Go Back

Secure Software Architecture and Design: Security Evaluation for Hybrid Approach

Jameel Ahmad Qurashi1 , Harvir Singh2 , Vijay Nunia3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-12 , Page no. 1-6, Dec-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i12.16

Online published on Dec 31, 2019

Copyright © Jameel Ahmad Qurashi, Harvir Singh, Vijay Nunia . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jameel Ahmad Qurashi, Harvir Singh, Vijay Nunia, “Secure Software Architecture and Design: Security Evaluation for Hybrid Approach,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.12, pp.1-6, 2019.

MLA Style Citation: Jameel Ahmad Qurashi, Harvir Singh, Vijay Nunia "Secure Software Architecture and Design: Security Evaluation for Hybrid Approach." International Journal of Computer Sciences and Engineering 7.12 (2019): 1-6.

APA Style Citation: Jameel Ahmad Qurashi, Harvir Singh, Vijay Nunia, (2019). Secure Software Architecture and Design: Security Evaluation for Hybrid Approach. International Journal of Computer Sciences and Engineering, 7(12), 1-6.

BibTex Style Citation:
@article{Qurashi_2019,
author = {Jameel Ahmad Qurashi, Harvir Singh, Vijay Nunia},
title = {Secure Software Architecture and Design: Security Evaluation for Hybrid Approach},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2019},
volume = {7},
Issue = {12},
month = {12},
year = {2019},
issn = {2347-2693},
pages = {1-6},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4965},
doi = {https://doi.org/10.26438/ijcse/v7i12.16}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i12.16}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4965
TI - Secure Software Architecture and Design: Security Evaluation for Hybrid Approach
T2 - International Journal of Computer Sciences and Engineering
AU - Jameel Ahmad Qurashi, Harvir Singh, Vijay Nunia
PY - 2019
DA - 2019/12/31
PB - IJCSE, Indore, INDIA
SP - 1-6
IS - 12
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
393 511 downloads 158 downloads
  
  
           

Abstract

Software furnishes administrations that may accompany a few vulnerabilities or risks. Attackers perform activities that break the security of framework through dangers and cause disappointment. To dodge security helplessness, there are numerous security- explicit ideas that ought to be resolved as prerequisites amid software improvement life cycle so as to convey solid and secure software. This paper first, studies various existing procedures, systems required for creating secure software dependent on the related distributed works. It begins by displaying the most important Secure Software Development Lifecycle, a correlation within the primary security highlights for each procedure is proposed. The consequences of the examination will give the software engineer with a rule which will help in choosing the best secured process. Second, the paper lists a lot of the most broadly utilized determination dialects with the points of interest and impediments for each

Key-Words / Index Term

Software, Security, Security evaluation, vulnerabilities, secure architecture etc

References

[1] S. Horing, J. Menard, and R. Staehler, “Stored Program Controlled Network,” Bell System Technical Journal, vol. 61, no. 7, 1982.
[2] D. L. Tennenhouse, J. M. Smith, W. D. Sincoskie, D. J. Wetherall, and G. J. Minden, “A survey of active network research,” IEEE Communications Magazine, vol. 35, no. 1, pp. 80–86, 1997.
[3] M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. Shenker, “SANE: A protection architecture for enterprise networks,” in USENIX Security Symposium, 2006.
[4] M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker, “Ethane: Taking control of the enterprise,” in ACM SIGCOMM Computer Communication Review, vol. 37, no. 4. ACM, 2007, pp. 1–12.
[5] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, “OpenFlow: enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008.
[6] Schneider, T., “Secure Software Engineering Processes: Improving the Software Development Life Cycle to Combat Vulnerability”, SQP VOL. 9, NO. 1, 2006, http://www.asq.org
[7] McGraw, G., Software Security: Building Security In, Addison Wesley, 2006
[8] Verdon, D. and McGraw, G., “Risk Analysis in Software Design,” IEEE Security and Privacy, IEEE CS Press, 2004, volume 2, number 4, pages 79-84.
[9] Lipner, S., “The Trustworthy Computing Security Development Lifecycle,” In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC ‘04), Tucson, Arizona, USA, 2004, IEEE CS Press, pages 2-13.
[10] Flechais, I., Mascolo, C., and Sasse, M. A., “Integrating Security and Usability into the Requirements and Design Process,” International Journal of Electronic Security and Digital Forensics, Inderscience Publishers, Geneva, Switzerland, 2007, volume 1, number 1, pages 12-26.
[11] Sodiya, A. S., Onashoga, S. A., and Ajayi, O. B., “Towards Building Secure Software Systems,” Issues in Informing Science and Information Technology, Informing Science Institute, California, USA, 2006, volume 3, pages 635-646.
[12] Mead, N. R., Hough, E., and Stehney, T. “Security Quality Requirements Engineering (SQUARE) Methodology,” Technical Report CMU/SEI-2005-TR-009, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, USA, 2005.
[13] L. Futcher and R.v. Solms, “SecSDM: A Model for Integrating Security into the Software Development Life Cycle,” In IFIP International Federation for Information Processing, Volume 237, Proc. of the 5th World Conference on Information Security Education, Springer, 2007, pp. 41-48
[14] I. Flechais, M.A. Sasse, and S.M.V. Hales, “Bringing Security Home: A Process for Developing Secure and Usable Systems,” In Proc. of the New Security Paradigms Workshop (NSPW’07), Ascona, Switzerland, ACM Press, 2003, pp. 49- 57.
[15] J. Gregoire, K. Buyens, B. De Win, R. Scandariato, and W. Joosen, “On the Secure Software Development Process: CLASP and SDL Compared,” In Proc. of the 3rd International Workshop on Software Engineering for Secure Systems (SESS’07), Minneapolis, Minnesota, USA, IEEE CS Press, 2007, pp. 1-1.
[16] M. Graves and M. Zulkernine, “Bridging the Gap: Software Specification Meets Intrusion Detector,” In Proc. of the 4th Annual Conference on Privacy, Security and Trust (PST’06), Ontario, Canada, pp. 265-274.
[17] Jameel Ahmad Qurashi, Sanjay Kumar "Secure Software Architecture: A Hybrid Approach Based On Non-Functional Security Requirements." International Journal of Computer Sciences and Engineering 7.1 (2019): 790-794.
[18] Anooja A, Jameel Ahmad Qurashi, Sanjay Kumar "A Survey Study of Various Software Cost Effort Estimation in Perspective of India." International Journal of Computer Sciences and Engineering 7.1 (2019): 928-933.