scholarly journals Security Modeling for Web Based Visitor‘s Login System for Pursuance of Security Design Pattern

In recent years because of the widespread use of internet and other communication media security occurrences have broken all the barricades. System gets attacked by malicious attackers and various cyber criminalities. Every system should be built by taking security as a main priority while building a system so as to make it reliable, safety and also it should be enhanced with other quality parameters. Hence since beginning at every phase of software development till the implementation of the software, security aspect is needed to take into consideration before making the final design decision to avoid the expenses which may incur while recovering of the system after the damage. For attainment of this, it is must to integrate the security at each phase of the software development. The software developers insists on incorporating the software safeguards at the design phase which may wind up in identifying the architecture restrictions related with the security which in fact may not be necessary. To reduce this problem, this paper intends a structure for security development activities. These activities consist of security requirements identification and threats analysis which are to be converted into design decisions to lessen the risks to identified important assets. The recognized design parameters are then manually prioritized using VOSREP and CRAMM and accordingly Security design pattern is to be developed to incorporate security in the software. By manually calculating values of assets and prioritizing will help to identify the security requirements at the early stage of the software development life cycle. Accordingly the decisions for developing the security design pattern are to be taken for building the software system

Author(s):  
Richard L. Nagy ◽  
David G. Ullman ◽  
Thomas G. Dietterich

Abstract Collaborative design projects place additional burdens on current design documentation practices. The literature on group design has repeatedly documented the existence of problems in design decision making due to the unavailability of design information. This paper describes a data representation developed for collaborative mechanical design information. The data representation is used to record the history of the design as a sequence of design decisions. The resulting knowledge base records the final specifications, the alternatives which were considered during the design process, and the designers’ rationale for choosing the final design parameters. It is currently used in a computerized knowledge base system under development by the Design Process Research Group (DPRG), at the authors’ institution (OSU).


Author(s):  
Walid Al-Ahmad

Security is an important and challenging aspect that needs to be considered at an early stage during software development. Traditional software development methodologies do not deal with security issues and so there is no structured guidance for security design and development; security is usually an afterthought activity. This paper discusses the integration of XP with security activities based on the CLASP (Comprehensive Lightweight Application Security Process) methodology. This integration will help developers using XP develop secure software by applying security measures in all phases and activities, thereby minimizing the security vulnerabilities exploited by attackers.


2018 ◽  
Vol 223 ◽  
pp. 01019 ◽  
Author(s):  
Vladimir Modrak ◽  
Zuzana Soltysova

Definitions of complexity often depend on several circumstances, such as the nature of investigated complex system, the kind of complexity, the conceptual framework used for a study, the theoretical approach taken, and the like. In this paper, two complexity measures that are based on Boltzmann’s entropy concept and AD theory are proposed and described. The first measure quantifies product variety complexity and the second one focuses on process structure complexity. Such complexity techniques will be used to determine product platform complexity and related process complexity for early stage of design decision-making. The method focused on product platform complexity assumes that the distribution of FR-DP couplings offers a suitable complexity concept, which prescribes that coupled designs should be decoupled, if possible, since uncoupled design is ideal and a decoupled design is less good, while a coupled design is the least satisfactory. Analogically, the same principle is used for the purpose to quantify topological process complexity by transforming input components into process variables and product modules including final product into design parameters. Subsequently, relevant properties of these measures will be analysed by computational experiments. Finally, practical findings for mass customization practice will be presented.


2014 ◽  
Vol 5 (4) ◽  
pp. 1-30 ◽  
Author(s):  
Takanori Kobashi ◽  
Nobukazu Yoshioka ◽  
Haruhiko Kaiya ◽  
Hironori Washizaki ◽  
Takano Okubo ◽  
...  

Software developers are not necessarily security experts, confirming potential threats and vulnerabilities at an early stage of the development process (e.g., in the requirement- and design-phase) is insufficient. Additionally, even if designed software considers security at an early stage, whether the software really satisfies the security requirements must be confirmed. To realize secure design, this work proposes an application to validate security patterns using model testing. Its method provides extended security patterns, which include requirement- and design-level patterns as well as a new model testing process using these patterns. After a developer specifies threats and vulnerabilities in the target system during an early stage of development, this method can validate whether the security patterns are properly applied and assess if these vulnerabilities are resolved.


2011 ◽  
Vol 2 (3) ◽  
pp. 63-76 ◽  
Author(s):  
Walid Al-Ahmad

Security is an important and challenging aspect that needs to be considered at an early stage during software development. Traditional software development methodologies do not deal with security issues and so there is no structured guidance for security design and development; security is usually an afterthought activity. This paper discusses the integration of XP with security activities based on the CLASP (Comprehensive Lightweight Application Security Process) methodology. This integration will help developers using XP develop secure software by applying security measures in all phases and activities, thereby minimizing the security vulnerabilities exploited by attackers.


Author(s):  
Q. Z. Yang ◽  
B. Song

This paper presents a hierarchical fuzzy evaluation approach to product lifecycle sustainability assessment at conceptual design stages. The purpose is to advocate the emerging use of lifecycle engineering methods in support of evaluation and selection of design alternatives for sustainable product development. A fuzzy evaluation model is developed with a hierarchical criteria structure to represent different sustainability considerations in the technical, economic and environmental dimensions. Using the imprecise and uncertain early-stage product information, each design option is assessed by the model with respect to the hierarchical evaluation criteria. Lifecycle engineering methods, such as lifecycle assessment and lifecycle costing analysis, are applied to the generation of the evaluation criteria. This would provide designers with a more complete lifecycle view about the product’s sustainability potentials to support decision-making in evaluation and selection of conceptual designs. The proposed approach has been implemented in a sustainable design decision-support software prototype. Illustrative examples are discussed in the paper to demonstrate the use of the approach and the prototype in conceptual design selection of a consumer product.


2012 ◽  
Vol 2012 ◽  
pp. 1-10 ◽  
Author(s):  
Yan Xu ◽  
Fuling Guan ◽  
Xian Xu ◽  
Hongjian Wang ◽  
Yao Zheng

This paper addresses a type of deployable mesh antenna consisting of the double-ring deployable truss edge frame and the cable net reflector. The structural design concept of the deployable antennas is presented. The deployable truss is designed and the geometric relationship of each strut length is formulated. Two types of radial truss elements are described and compared. The joint pattern and the active cables of the final design concept are determined. The pattern of the cable net is the three-orientation grid. Two connection schemes between the reflector and the deployable edge frame are investigated. The design parameters and the shape adjustment mechanism of this cable net are determined. The measurement test technologies of the antennas on the ground including test facilities, deployment test, and measurement and adjustment test are proposed. The antenna patterns are analyzed based on the real surfaces of the reflector obtained by the reflective surface accuracy measurement. The tests and analytic results indicated that the accuracy of the reflective surface is high and is suitable for low-frequency communication.


Author(s):  
Jorge Melegati ◽  
Rafael Chanin ◽  
Afonso Sales ◽  
Rafael Prikladnicki

Abstract In this position paper, our goal is to argue the need for specific software development practices to early-stage startups. In order to reach this goal, we discuss the consequences of innovative and market-driven contexts, which are two of the key elements when describing software startups. We also argue that these practices could be applied to innovative initiatives within established companies since they share similar characteristics and challenges as those from startups.


Author(s):  
Fredrik Seehusen ◽  
Ketil Stølen

We present a method for software development in which information flow security is taken into consideration from start to finish. Initially, the user of the method (i.e., a software developer) specifies the system architecture and selects a set of security requirements (in the form of secure information flow properties) that the system must adhere to. The user then specifies each component of the system architecture using UML inspired state machines, and refines/transforms these (abstract) state machines into concrete state machines. It is shown that if the abstract specification adheres to the security requirements, then so does the concrete one provided that certain conditions are satisfied.


Sign in / Sign up

Export Citation Format

Share Document