Security durability assessment through fuzzy analytic hierarchy process

被引:26
|
作者
Agrawal, Alka [1 ]
Zarour, Mohammad [2 ]
Alenezi, Mamdouh [2 ]
Kumar, Rajeev [1 ]
Khan, Raees Ahmad [1 ]
机构
[1] Babasaheb Bhimrao Ambedkar Univ, Informat Technol, Lucknow, Uttar Pradesh, India
[2] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
来源
关键词
Software security; Security durability; Fuzzy AHP; Triangular fuzzy numbers; Software durability; ARCHITECTURE;
D O I
10.7717/peerj-cs.215
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Background: Security is an integral aspect of the development of quality software. Furthermore, security durability is even more imperative and in persistent demand due to high investment in recent years. To achieve the desired target of efficacious and viable durability of security services, there needs to be nodal focus on durability along with security. Unfortunately, the highly secure design of software becomes worthless because the durability of security services is not as it should be. Methods: Security durability attributes have their own impact while integrating security with durability and assessment of security durability plays a crucial role during software development. Within this context, this paper estimates the security durability of the two alternatives versions of a locally developed software called version 1 and version 2. To assess the security durability, authors are using the hybrid fuzzy analytic hierarchy process decision analysis approach. Results: The impact of the security durability on other attributes has been evaluated quantitatively. The result obtained contains the assessment of security durability. The study posits conclusions which are based on this result and are useful for practitioners to assess and improve the security life span of software services.
引用
收藏
页数:44
相关论文
共 50 条
  • [1] Fuzzy Analytic Hierarchy Process for Software Durability: Security Risks Perspective
    Kumar, Rajeev
    Khan, Suhel Ahmad
    Khan, Raees Ahmad
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 469 - 478
  • [2] Research on Computer Network Security Assessment Based on Fuzzy Analytic Hierarchy Process
    Li, Chun-yuan
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 110 - 115
  • [3] Information Security Risk Assessment Based On Analytic Hierarchy Process and Fuzzy Comprehensive
    Xiao Long
    Qi Yong
    Li Qianmu
    [J]. 2008 INTERNATIONAL CONFERENCE ON RISK MANAGEMENT AND ENGINEERING MANAGEMENT, ICRMEM 2008, PROCEEDINGS, 2008, : 404 - 409
  • [4] DURABILITY ASSESSMENT OF REINFORCED CONCRETE BRIDGES BASED ON ANALYTIC HIERARCHY PROCESS AND FUZZY SYNTHETIC EVALUATION
    Yuan Chengfang
    Niu Ditao
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON INSPECTION APPRAISAL REPAIRS AND MAINTENANCE OF STRUCTURES, VOLS 1 AND 2, 2010, : 1327 - 1332
  • [5] An Information System Security Risk Assessment Model Based on Fuzzy Analytic Hierarchy Process
    Liu Dong-liang
    Yang Shi-song
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 874 - 877
  • [6] Network Security Risk Assessment Method Research Based on Fuzzy Analytic Hierarchy Process
    Yu, Zhi
    Xu, Xiang
    Wu, Xianjie
    [J]. NANOTECHNOLOGY AND COMPUTER ENGINEERING, 2010, 121-122 : 80 - 86
  • [7] Assessing Computer Network Security with Fuzzy Analytic Hierarchy Process
    Fei, Jun
    Xu, Huan
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 5, 2010, : 204 - 208
  • [8] Integrated analytic hierarchy process and fuzzy analytic hierarchy process for Sahel watershed flood susceptibility assessment, Algeria
    Mokhtari, Elhadj
    Abdelkebir, Brahim
    Djenaoui, Abdelouahed
    Hamdani, Nour El Houda
    [J]. WATER PRACTICE AND TECHNOLOGY, 2024, 19 (02) : 453 - 475
  • [9] Ranking information security controls by using fuzzy analytic hierarchy process
    Khajouei, Hamid
    Kazemi, Mehdi
    Moosavirad, Seyed Hamed
    [J]. INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2017, 15 (01) : 1 - 19
  • [10] Ranking information security controls by using fuzzy analytic hierarchy process
    Hamid Khajouei
    Mehdi Kazemi
    Seyed Hamed Moosavirad
    [J]. Information Systems and e-Business Management, 2017, 15 : 1 - 19