Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process

被引:41
|
作者
Kumar, Rajeev [1 ]
Zarour, Mohammad [2 ]
Alenezi, Mamdouh [2 ]
Agrawal, Alka [1 ]
Khan, Raees Ahmad [1 ]
机构
[1] BBA Univ, Dept Informat Technol, Lucknow, UP, India
[2] Prince Sultan Univ, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
Software security; Software durability; Security durability; Fuzzy logic; Simple average method; Rating evaluation; PREFERENCE RELATIONS; TRUSTWORTHINESS; RISK;
D O I
10.2991/ijcis.d.190513.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is critical to develop secure software with long-term performance and capability to withstand and forestall the growing competition in the software development industry. To enhance the potential of Confidentiality, Integrity, and Availability ( CIA), a mechanism is required to built in and secure the durability at the time of software development. Security of a software product is durable if the software works efficiently for user's satisfaction up to the expected duration. Despite the fact that focusing on security which is durable enough considerably reduces maintenance cost, the work done on addressing security as well as durability issues simultaneously during software development remains minimal. To achieve durable security, there is a need to fill the gap between security and durability through identifying and establishing a relationship between security and durability attributes. This article extends the concept of the life span of security services and assesses as well as prioritizes security durability attributes by taking a real-time case study. While building durable security, security experts often face complicated decision problems. Hence, multi-criteria decision-making techniques have been used to solve the issues of measuring conflicting tangible/ intangible criteria. In addition, the fuzzy simple average method is used for finding out the rating of security durability attributes. The work has been demonstrated by taking a case study. The results of the study would be useful for security developers to assure the importance of attributes for improving the duration of security. (c) 2019 The Authors. Published by Atlantis Press SARL.
引用
收藏
页码:627 / 642
页数:16
相关论文
共 50 条
  • [31] Intuitionistic Fuzzy-Based Multi-Attribute Decision-Making Approach for Selection of Inventory Policy
    Deb, Mahuya
    Kaur, Prabjot
    [J]. ADVANCES IN COMPUTATIONAL INTELLIGENCE, 2017, 509 : 45 - 54
  • [32] Effective waste management in service industry: Fuzzy-based modelling approach for strategic decision-making
    Dincer, Hasan
    Yuksel, Serhat
    Eti, Serkan
    Gokalp, Yasar
    Mikhaylov, Alexey
    Karpyn, Zuleima
    [J]. WASTE MANAGEMENT & RESEARCH, 2024,
  • [33] A new Pythagorean fuzzy-based decision-making method through entropy measure for fuel cell and hydrogen components supplier selection
    Alipour, M.
    Hafezi, R.
    Rani, Pratibha
    Hafezi, Mehdi
    Mardani, Abbas
    [J]. ENERGY, 2021, 234
  • [34] Fuzzy Analytic Hierarchy Process for Software Durability: Security Risks Perspective
    Kumar, Rajeev
    Khan, Suhel Ahmad
    Khan, Raees Ahmad
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 469 - 478
  • [35] National Security Decision-Making in Israel: Improving the Process
    Freilich, Charles D.
    [J]. MIDDLE EAST JOURNAL, 2013, 67 (02): : 257 - 266
  • [36] DECISION-MAKING FOR SOFTWARE PROCESS IMPROVEMENT - A QUANTITATIVE APPROACH
    DEBOU, C
    LIPTAK, J
    SCHIPPERS, H
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 1994, 26 (01) : 43 - 52
  • [37] A model of the information security investment decision-making process
    Dor, Daniel
    Elovici, Yuual
    [J]. COMPUTERS & SECURITY, 2016, 63 : 1 - 13
  • [38] A fuzzy-based decision making procedure for machine selection problem
    Ozceylan, Eren
    Kabak, Mehmet
    Dagdeviren, Metin
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2016, 30 (03) : 1841 - 1856
  • [39] DECISION-MAKING AUTOMATION FUZZY DECISION-MAKING IN INDUSTRY
    Soulhi, Aziz
    Guedira, Said
    El Alami, Nour-eddine
    [J]. PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING AND DATA BASES, 2009, : 181 - +
  • [40] Security durability assessment through fuzzy analytic hierarchy process
    Agrawal, Alka
    Zarour, Mohammad
    Alenezi, Mamdouh
    Kumar, Rajeev
    Khan, Raees Ahmad
    [J]. PEERJ COMPUTER SCIENCE, 2019,