CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Design Pattern and Security Influence on Application Development

by Zia Ahmad, Adeel Rauf, Mian Ali Asghar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 151 - Number 1
Year of Publication: 2016
Authors: Zia Ahmad, Adeel Rauf, Mian Ali Asghar
10.5120/ijca2016910244

Zia Ahmad, Adeel Rauf, Mian Ali Asghar . Design Pattern and Security Influence on Application Development. International Journal of Computer Applications. 151, 1 ( Oct 2016), 10-18. DOI=10.5120/ijca2016910244

@article{ 10.5120/ijca2016910244,
author = { Zia Ahmad, Adeel Rauf, Mian Ali Asghar },
title = { Design Pattern and Security Influence on Application Development },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2016 },
volume = { 151 },
number = { 1 },
month = { Oct },
year = { 2016 },
issn = { 0975-8887 },
pages = { 10-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume151/number1/26195-2016910244/ },
doi = { 10.5120/ijca2016910244 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:55:55.068558+05:30
%A Zia Ahmad
%A Adeel Rauf
%A Mian Ali Asghar
%T Design Pattern and Security Influence on Application Development
%J International Journal of Computer Applications
%@ 0975-8887
%V 151
%N 1
%P 10-18
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

It’s common among developers when they start coding for an application, a specific design pattern not found in the road map of development and it becomes a vulnerable point to exploit. Applications developed without design pattern difficult to change and understand. It is possible to reduce vulnerability at minimum level and it results in the reduction of maintenance cost. An application was developed for this paper using design patterns, two pages visitor information page and school member verification form were build using Factory design pattern and Interpreter design patter. SFDP and SIDP are the two secured design patterns proposed for making application secure and more reliable than before using encryption-decryption hashing algorithm encoding scheme. The points expressed in proposed model clearly explain the expected vulnerable points. A secure design will keep application more reliable and available as it was before.

References
  1. T. Richardson and C. Thies, Secure Software Design: Jones & Bartlett Publishers, 2012.
  2. Z. Ahmad, M. Asif, M. Shahid, and A. Rauf, "Implementation of Secure Software Design and their impact on Application," International Journal of Computer Applications, vol. 120, pp. 8-15, 2015.
  3. B. Eshete, A. Villafiorita, and K. Weldemariam, "Malicious website detection: Effectiveness and efficiency issues," in SysSec Workshop (SysSec), 2011 First, 2011, pp. 123-126.
  4. C. Alexander, S. Ishikawa, and M. Silverstein, A pattern language: towns, buildings, construction vol. 2: Oxford University Press, 1977.
  5. K. Beck and W. Cunningham, "Using pattern languages for object-oriented programs," 1987.
  6. E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design patterns: elements of reusable object-oriented software: Pearson Education, 1994.
  7. J. Yoder and J. Barcalow, "Architectural patterns for enabling application security," Urbana, vol. 51, p. 61801, 1998.
  8. Dougherty. Chad, Sayre. Kirk, Seacord. Robert, Svoboda. David, and Togashi. Kazuya, "Secure Design Patterns," Software Engineering Institute, Carnegie Mellon University, p. 118, 2009.
  9. A. J. Ko, R. Abraham, L. Beckwith, A. Blackwell, M. Burnett, M. Erwig, et al., "The state of the art in end-user software engineering," ACM Computing Surveys (CSUR), vol. 43, p. 21, 2011.
  10. K. Lano, "Design patterns: applications and open issues," in Cyberpatterns, ed: Springer, 2014, pp. 37-45.
  11. G. Booch, The unified modeling language user guide: Pearson Education India, 2005.
  12. L. S. ‎Jimmy Wales‎, "Wikipedia, the free encyclopedia," www.en.wikipedia.org, January 15 2001.
  13. A. Globa, "Supporting the use of algorithmic design in architecture: An empirical study of reuse of design knowledge," 2015.
  14. Y.-T. Hou, Y. Chang, T. Chen, C.-S. Laih, and C.-M. Chen, "Malicious web content detection by machine learning," Expert Systems with Applications, vol. 37, pp. 55-60, 2010.
  15. A. Baker, A. van der Hoek, H. Ossher, and M. Petre, "Guest editors' introduction: studying professional software design," Software, IEEE, vol. 29, pp. 28-33, 2012.
  16. M. U. A. Khan and M. Zulkernine, "Activity and artifact views of a secure software development process," in Computational Science and Engineering, 2009. CSE'09. International Conference on, 2009, pp. 399-404.
Index Terms

Computer Science
Information Sciences

Keywords

Software design patterns vulnerability security pattern refactoring secure software design secure pattern.